정보기술

Web hacking, dangerous code check program

Server hacking was made to easily check whether the malicious PHP was installed, monitoring and risk code. Write the code on the server account and upload it. Click the download button below to download the monitoring program. Run the downloaded program and enter the URL written in (1) in the URL (S). Click Diagnose to tell you the suspected file name as shown below. Not usually ...

Sshscript - Linux (web hosting) Backup comfortably

How to use Run the program. Click the File button, write the work as shown below, and save it. (If you have multiple accounts, you can write it repeatedly.) Press the run button to run. Download Download (Kilhonet) Think After being damaged by one who used Nayana web hosting, I made it with the importance of the backup ㅠㅠ

Simple CDN service module made with PHP

I used Cloudflare to reduce the traffic load, but the connection location was LAX (Los Angeles), so I made it to be used to use it as a CDN form. The server is located in VULTR. The principle is that kilho.net/ {file} is connected to cdn.kilho.net/ {file} to disperse the traffic of the main hosting.[PHP] <? $cfg['url'] = 'kilho.net'; $cfg['cache'] = '../data/cache'; $url = $_SERVER['REQUEST_SCHEME'].'://'.$cfg['url'].$_SERVER['REQUEST_URI']; $url_arr = parse_url($url); switch($_SERVER['REQUEST_METHOD']) { case 'GET': $filename = $cfg['cache'].$url_arr['path']; $dirname = dirname($filename); if(!is_file($filename)) { if(!is_dir($dirname)) mkdir($dirname, 0707, true); $ch = curl_init(); $fp =...

HTTP access information record

When using OpenAPI, it is to check whether the test and access information is properly Messos value, host, POST value when connecting[PHP] <? $log = $_SERVER['REQUEST_METHOD'].' '.$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']."nn"; foreach($_SERVER as $k => $v) { if($k=='HTTP_HOST') continue; if(substr($k, 0,5)!='HTTP_') continue; $log .= '$k: $v'."n"; } $log .= "n"; $post = array_map('urldecode', explode('&', file_get_contents('php://input'))); foreach($post as $v) { $log .= "$vn"; } $log .= "-----------------------------------n"; file_put_contents('log.txt', $log, FILE_APPEND | LOCK_EX); ?> [/PHP]

Modify the WordPress theme

It is a method of modifying the file that is backed up (represented by a child theme) without touching the original when modifying the WordPress theme. To easily check the children theme used, create a new folder in the "WP-Content/Theme" folder by combining the theme name. Copy the "Style.css" of the original theme to the child theme folder and "Theme Name", "Themplate" as below ...