search
HomeBackend DevelopmentPHP TutorialActive and Passive in PHP Language Process Control_PHP Tutorial

Over the past year, most PHPers have been working hard on projects such as Taobao revision, cloud computing, Tencent open platform, and online games. These works are indispensable for PHPers. I believe that the PHP language can continue to lead the industry for 10 years. We look forward to the next 50 and 100 years. , PHP is still so powerful. We are all a small group of people. Apart from knowing PHP, we are not good at anything else and it is difficult to make a living. Let’s all work hard.

What is active and passive. Let’s give an example. When you go to your boss's office to ask for a salary increase, this is taking the initiative. Whether from your own perspective or from the boss's perspective, you are proactive and optimistic. If the boss asks you to go to the office, and then let him You structure Taobao and give you a 20% salary increase. This is called passive. I believe you will be passive if you promise. Active and passive are simply understood in this way. And we will also encounter such embarrassing active and passive issues in the program process. We See the example.

A clier
When buy qq successfully purchases the goods, notify the QQ main server. Through the http protocol.
file_get_contents('http://www.qq.com/api.php ?add_saleinfo=buy_qq&orderid=12345&pay=888&email=a@qq.com');

The code runs on buy.qq.com, which is understood to be safe, but what is the reality? If someone distributes this interface, the consequences will be immeasurable. Everyone can forge order information and implant it into qq.com. No matter how you restrict the source and check the data. Taking a step back, the person who wrote the code is the most dangerous. Then everyone will ask , since the person who writes the code has great authority, how can it be prevented? This needs to be changed from passive (qq.com) to active. http://www.qq.com/api.php?add_saleinfo=buy_qq Change to no Then receive any order information. It is the token value. After receiving the token value, the interface calls back the query interface of buy.qq, and then stores it in the database. Ordinary users can no longer create token values, even if they know the query interface of buy.qq , and it is impossible to affect qq.com. As the main body, qq.com is basically proactive. It will not be chaotic at all times, but actively analyze and think about warehousing.

The same principle is true, and Taobao players also have it This problem. For example, some browsers that have been exposed in the past modify the pid value in the web page, causing heavy losses to users. This is a passive result. PHP is written like this, PHP requests the Taobao API interface, receives product information, and there are products in it Purchase link, it is this purchase link that makes the webmaster passive. Users who directly href this link on the page may be collected by others and have their pid modified by the browser. Next, you know, pid represents money. Later, someone thought about this problem and took a proactive approach to prevent bugs. That is, the product link was not displayed directly, but modified through a php. The URL that users saw was similar to: www.qq.com/tao/ buy.php?sid=aaaa333 sid is definitely not the pid value. All work is carried out by buy.php, which actively undertakes analysis and security detection work.

QQ Internet 2.0 has been widely used on Internet sites. How does graph.qq.com, which focuses on user data, ensure user security? It must also improve security while ensuring access speed. The current QQ login process is as follows: first, the appid appkey callbackurl is combined into a string of links, and then jumps to qq .com. This is why many sites can jump to the qq login page by directly accessing qqlogin.php, because the parameters are fixed and the security is pretty good. The login process is still at qq.com, which is what phper often talks about Single sign-on. After successful login, it will jump directly to the callbackurl page. The information obtained by callbackurl at this time is still not enough to prove that the user has successfully logged in. It only got the token value, so enter the second step and use the token value to go to the qq api interface. Query the user's openid online and complete the login. In this way, QQ has to take the initiative. The query result is not simply whether it is successful or not, but the corresponding parameters and prompt information. No matter how it is added later, it will be compatible. Tencent has the initiative, and this It is very important for companies with hundreds of millions of users. Internal security also includes determining the correspondence between domain names and appids, token expiration checks, and IP restrictions. From a technical perspective, Tencent has it.

There are many examples of this. PayPal and Alipay are all similar.

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/326143.htmlTechArticleOver the past year, the majority of phpers have been working hard, such as Taobao revision, cloud computing, Tencent open platform, online games , these works are indispensable for the contribution of phper. I believe that the php language can continue to lead the industry...
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What is the best way to send an email using PHP?What is the best way to send an email using PHP?May 08, 2025 am 12:21 AM

ThebestapproachforsendingemailsinPHPisusingthePHPMailerlibraryduetoitsreliability,featurerichness,andeaseofuse.PHPMailersupportsSMTP,providesdetailederrorhandling,allowssendingHTMLandplaintextemails,supportsattachments,andenhancessecurity.Foroptimalu

Best Practices for Dependency Injection in PHPBest Practices for Dependency Injection in PHPMay 08, 2025 am 12:21 AM

The reason for using Dependency Injection (DI) is that it promotes loose coupling, testability, and maintainability of the code. 1) Use constructor to inject dependencies, 2) Avoid using service locators, 3) Use dependency injection containers to manage dependencies, 4) Improve testability through injecting dependencies, 5) Avoid over-injection dependencies, 6) Consider the impact of DI on performance.

PHP performance tuning tips and tricksPHP performance tuning tips and tricksMay 08, 2025 am 12:20 AM

PHPperformancetuningiscrucialbecauseitenhancesspeedandefficiency,whicharevitalforwebapplications.1)CachingwithAPCureducesdatabaseloadandimprovesresponsetimes.2)Optimizingdatabasequeriesbyselectingnecessarycolumnsandusingindexingspeedsupdataretrieval.

PHP Email Security: Best Practices for Sending EmailsPHP Email Security: Best Practices for Sending EmailsMay 08, 2025 am 12:16 AM

ThebestpracticesforsendingemailssecurelyinPHPinclude:1)UsingsecureconfigurationswithSMTPandSTARTTLSencryption,2)Validatingandsanitizinginputstopreventinjectionattacks,3)EncryptingsensitivedatawithinemailsusingOpenSSL,4)Properlyhandlingemailheaderstoa

How do you optimize PHP applications for performance?How do you optimize PHP applications for performance?May 08, 2025 am 12:08 AM

TooptimizePHPapplicationsforperformance,usecaching,databaseoptimization,opcodecaching,andserverconfiguration.1)ImplementcachingwithAPCutoreducedatafetchtimes.2)Optimizedatabasesbyindexing,balancingreadandwriteoperations.3)EnableOPcachetoavoidrecompil

What is dependency injection in PHP?What is dependency injection in PHP?May 07, 2025 pm 03:09 PM

DependencyinjectioninPHPisadesignpatternthatenhancesflexibility,testability,andmaintainabilitybyprovidingexternaldependenciestoclasses.Itallowsforloosecoupling,easiertestingthroughmocking,andmodulardesign,butrequirescarefulstructuringtoavoidover-inje

Best PHP Performance Optimization TechniquesBest PHP Performance Optimization TechniquesMay 07, 2025 pm 03:05 PM

PHP performance optimization can be achieved through the following steps: 1) use require_once or include_once on the top of the script to reduce the number of file loads; 2) use preprocessing statements and batch processing to reduce the number of database queries; 3) configure OPcache for opcode cache; 4) enable and configure PHP-FPM optimization process management; 5) use CDN to distribute static resources; 6) use Xdebug or Blackfire for code performance analysis; 7) select efficient data structures such as arrays; 8) write modular code for optimization execution.

PHP Performance Optimization: Using Opcode CachingPHP Performance Optimization: Using Opcode CachingMay 07, 2025 pm 02:49 PM

OpcodecachingsignificantlyimprovesPHPperformancebycachingcompiledcode,reducingserverloadandresponsetimes.1)ItstorescompiledPHPcodeinmemory,bypassingparsingandcompiling.2)UseOPcachebysettingparametersinphp.ini,likememoryconsumptionandscriptlimits.3)Ad

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool