Forum Moderators: coopster
the user-login-account data will be stored, in a sepperated file, will be (SHA1) hashed
how much effort does it take to "hack", find or alter these txt files with mcrypted data in their "777" (read/write/execute) directory's?
i can not alter r/w/e rights myself on my webspace, i was assuming i would need the "777" , but after trying the obvious options to atleast download/read the "txt" files, it became clear my Host was smart enough to give the directories the propper rights (i can not see them, i think its 666 now?)
i ame using un-ecnrypted .txt databases for many purposes, but i always wonder how safe this is, (*ie compared to mysql)?
Even low-budget sites can afford the price of mySQL!
By the way, "low budget" just screams "Visa/MasterCard CISP violations."
But now "Dmmh", i think u scared loads of people here, since like many others i also use a include file to connect to my mysql-db'z.
I assume u ment that when somebody has ftp-access, it is "easy" to "hack" the db?
thanx for the reply's :)
in this setup that wont be the case, as all data is encrypted anyway and user data is SHA1 encrypted, good luck trying to crack that
It doesn't matter if you use an include to a non-FTP accessible folder. If you have FTP access, you can always upload a file to run to give you exactly what you need.
dmmh has it right, worry more about cross includes on shared hosts than someone gaining ftp
you have stuff encrypted, you seem to have taken "reasonable means" to protect your data, as long as you only store data you truly need to store then you are on the right track.
just remember that nothing is ever 100% secure and always monitor your site.
at any rate it is a bad idea.
As I said before you are alright, your is ok. There are a million ways someone can get at your site but most of them are unlikely. Security is about making things difficult for the jokers that try automated hacks and to protect against things like XSS and SQL injection. We trust our host to protect the server itself and then we hope they have good monitoring. We also monitor our own systems and investigate anything that seems strange.
There is no 100% way to protect anything. The key is to watch and take the "necessary means" to protect ourselves.
you could drive yourself crazy trying to make a perfectly secure script/site
because there is no such thing
Well, isn't the decrypt key going to be in the PHP code somewhere? If so, it's a simple matter to access the file with FTP, scan through files to get the decrypt code, then decrypt the DB- no cracking involved. If not, then exactly WHERE is the decrypt key? Are you going to make the user enter it every time?
SHA1 is not decryptable, you can only check if 2 values match, but you can not decode the stored SHA1 encrypted data, so there wont be a script with a decryption key ;)
the other encrypted data could be decrypted in this very situation, but that's trivial
It doesn't matter if you use an include to a non-FTP accessible folder. If you have FTP access, you can always upload a file to run to give you exactly what you need.
exactly what I meant
if someone gains FTP access you're basically #*$!ed, either way, no matter how hard you try to prevent it
he is encrypting his user-login data with SHA1, which is pretty damn secure and the most important data to secure. The rest is basically trivial