-
Book Overview & Buying
-
Table Of Contents
Mastering phpMyAdmin 3.3.x for Effective MySQL Management
Security can be examined at various levels:
How we can protect the phpMyAdmin installation directory
Which workstations can access phpMyAdmin
The databases that a legitimate user can see
How in-transit data protection and access protection can be enforced via a physical USB key on the workstation
How we can use a logging system to record login attempts
Suppose an unauthorized person is trying to execute our copy of phpMyAdmin. If we use the simple config authentication type, anyone knowing the URL of our phpMyAdmin will have the same effective rights to our data as we do. In this case, we should use the directory protection mechanism offered by our web server (for example, .htaccess, a filename with a leading dot) to add a level of protection.
If we decide to use http or cookie authentication types, our data would be safe enough. However, we should take normal precautions with our password (including its periodic change).
The...
Change the font size
Change margin width
Change background colour