The following tutorial column of Pagoda Panel will introduce you to the tutorial on how to use Pagoda anti-tampering. I hope it will be helpful to friends in need!
Pagoda anti-tampering tutorial
1. Add a protection directory (all protected files in the default protection directory after adding)
2. View the project list
Start up at boot: closed by default, and closed after modifying any configuration. You need to turn on the anti-tampering switch to confirm that it is correct before setting it Start at boot
3. Interception protection
Default protection suffix: php, html, htm, shtml, tpl, js, css , jsp, do, ashx, asmx, asp, aspx, jsp, jspx, axd, cer, rem, soap, stm, config, htaccess
Other suffixes are not protected (as shown below)
4. Add custom protection suffix, directory whitelist, and process whitelist
5. Check the interception log
If you find that a directory and a process do not need to be intercepted, you can refer to the fourth step to set the process whitelist and directory whitelist
The above is the detailed content of Teach you what to do to make your pagoda tamper-proof. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

WebStorm Mac version
Useful JavaScript development tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

Dreamweaver Mac version
Visual web development tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.
