


Detailed explanation of how to use session-cookie in php and codeigniter
This article mainly introduces the detailed explanation of the method of using session-cookie in PHP and codeigniter. Interested friends can refer to it. I hope it will be helpful to everyone.
1. Read and write cookies
##Native
setcookie('name','value',time)Setup failed, not written to the browser normally, test failed, reason unknown
CI Framework
$this->input->set_cookie("views","test10",1000); echo $_COOKIE["views"];//此方法获取值时,如果值不存在会报错,当然可以先用isset($_COOKIE["views"])判断一下
By helper
$this->load->helper('cookie');//这行放在view也是可以的,随便 set_cookie('views','test10',1000); echo get_cookie('views');//此方法获取值如果获取不到,会返回空,不会报错
2. Read and write session
##Native session
Startup:<?php session_start(); ?>
##Assignment:
$_SESSION['views'] = "test20";
Value:
echo "Session:". $_SESSION['views'];
Duration:
Session. When the browser is closed, the phpsession in the cookie will be cleared, and a
will be regenerated next time it is opened, although the server still saves the session. The expiration time of the session is set in php.ini, see another articlephp (codeigniter) security considerations
CI framework session
Startup:
$this->load->library('session');//load必须在controller完成,当要使用session必须先load赋值: $this->session->views = "test11";
Value:
echo "Session:". $_SESSION['views'];
Duration:
The client has a duration of 2 hours, when the server's session is deleted , because the client's session id is still valid, so when it is opened again, the server will create a session with the same session id as the client's. Of course, it does not matter whether to create a new id or an old id, because only the id has the same name. There is no data
Difference>The two session names are different, one is called phpsession and the other is called ci_session
>Only one can be started, not both.>The values are the same.>Do not mix the two, and you should give up the native altogether. The way>The native phpsession can be accessed casually, and ci_session is httponly, which means that the native session may be attacked through xxs, and the cookie can be obtained through js ExceptionsThere is a situation like this:
At this time Ci_session already exists, because this ci_ is persistent
//session_start();//没有启动原生的session //$this->load->library('session');//没有启动ci的session $_SESSION['views'] = "test23";//直接用原生的方式进行赋值 echo "Session:". $_SESSION['views'];//可以正常取值出来"test23"By checking the cookie, it is found that no native session exists, and it can only be a ci session, then Find this file in the server's session and find that the value is not written in. If session_start() is declared, it will go to the native mode, re-create a phpsession, and the value will be written in.If nothing There is no declaration or assignment. If you take the value directly, an error will be reported. Because to use ci_session, you must load. If we don’t load, an error will be reported. Therefore, it is proved that when assigning value in the native way, it is equivalent to starting the session. , ci_session is enabled, but he does not have permission to write. This can be said to be a bug How session works
The operation of cookies is relatively easy to understand. It is written to the user cookie, and whatever is written is read out. As long as it is a cookie on this site, it can be read out by key value.
The value of session exists on the server, but how do you know which user this value belongs to? By storing the session file name in the user cookie, the saved value is placed in a file with the same name on the server. Stealing cookies refers to stealing this. Important information is stored on the server, but if it is stolen, it will be over. Therefore, the session-key stored in the cookie cannot be trusted, and authentication should be performed. Note,When writing the session, writing the session-key to the user's cookie is automatically completed. This duration should be in the server's php Configured in .ini. The above is the entire content of this article, I hope it will be helpful to everyone's study.
Related recommendations:
Solutions to MySQL high concurrency locking transaction processing issues
Using file_get_contents to send http request function is simple PHP Implemented Monkey King Algorithm (monkey chooses the king) ##
The above is the detailed content of Detailed explanation of how to use session-cookie in php and codeigniter. For more information, please follow other related articles on the PHP Chinese website!

Effective methods to prevent session fixed attacks include: 1. Regenerate the session ID after the user logs in; 2. Use a secure session ID generation algorithm; 3. Implement the session timeout mechanism; 4. Encrypt session data using HTTPS. These measures can ensure that the application is indestructible when facing session fixed attacks.

Implementing session-free authentication can be achieved by using JSONWebTokens (JWT), a token-based authentication system where all necessary information is stored in the token without server-side session storage. 1) Use JWT to generate and verify tokens, 2) Ensure that HTTPS is used to prevent tokens from being intercepted, 3) Securely store tokens on the client side, 4) Verify tokens on the server side to prevent tampering, 5) Implement token revocation mechanisms, such as using short-term access tokens and long-term refresh tokens.

The security risks of PHP sessions mainly include session hijacking, session fixation, session prediction and session poisoning. 1. Session hijacking can be prevented by using HTTPS and protecting cookies. 2. Session fixation can be avoided by regenerating the session ID before the user logs in. 3. Session prediction needs to ensure the randomness and unpredictability of session IDs. 4. Session poisoning can be prevented by verifying and filtering session data.

To destroy a PHP session, you need to start the session first, then clear the data and destroy the session file. 1. Use session_start() to start the session. 2. Use session_unset() to clear the session data. 3. Finally, use session_destroy() to destroy the session file to ensure data security and resource release.

How to change the default session saving path of PHP? It can be achieved through the following steps: use session_save_path('/var/www/sessions');session_start(); in PHP scripts to set the session saving path. Set session.save_path="/var/www/sessions" in the php.ini file to change the session saving path globally. Use Memcached or Redis to store session data, such as ini_set('session.save_handler','memcached'); ini_set(

TomodifydatainaPHPsession,startthesessionwithsession_start(),thenuse$_SESSIONtoset,modify,orremovevariables.1)Startthesession.2)Setormodifysessionvariablesusing$_SESSION.3)Removevariableswithunset().4)Clearallvariableswithsession_unset().5)Destroythe

Arrays can be stored in PHP sessions. 1. Start the session and use session_start(). 2. Create an array and store it in $_SESSION. 3. Retrieve the array through $_SESSION. 4. Optimize session data to improve performance.

PHP session garbage collection is triggered through a probability mechanism to clean up expired session data. 1) Set the trigger probability and session life cycle in the configuration file; 2) You can use cron tasks to optimize high-load applications; 3) You need to balance the garbage collection frequency and performance to avoid data loss.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Atom editor mac version download
The most popular open source editor

Notepad++7.3.1
Easy-to-use and free code editor
