[OWASP_PHPSEC] User-string verification

rahul chaudhary rahul300chaudhary400 at gmail.com
Sun Sep 15 21:09:50 UTC 2013


ok...will do...in ver 2... :)


On Sun, Sep 15, 2013 at 5:08 PM, Abbas Naderi <abiusx at owasp.org> wrote:

> That is not part of a security framework, though it is included in jWidget.
> It's a utility library, but is actually very beneficial to security.
>
> Its a good idea to move to under OWASP projects after you're done with
> PHPSEC duties.
> -A
>
> ______________________________________________________________
> *Notice:** *This message is *digitally signed*, its *source* and *
> integrity* are verifiable.
> If you mail client does not support S/MIME verification, it will display a
> file (smime.p7s), which includes the X.509 certificate and the signature
> body.  Read more at Certified E-Mail with Comodo and Thunderbird<http://abiusx.com/certified-e-mail-with-comodo-and-thunderbird/> in
> AbiusX.com
>
> On Sep 15, 2013, at 5:06 PM, rahul chaudhary <
> rahul300chaudhary400 at gmail.com> wrote:
>
> any user input such as an address field...we have to make library such
> that whatever they write in their end...enters our application only after
> proper validation and checks.
>
>
> On Sun, Sep 15, 2013 at 9:10 AM, Abbas Naderi <abiusx at owasp.org> wrote:
>
>> An example would be beneficial
>>      ______________________________________________________________
>> *Notice:** *This message is *digitally signed*, its *source* and *
>> integrity* are verifiable.
>> If you mail client does not support S/MIME verification, it will display
>> a file (smime.p7s), which includes the X.509 certificate and the signature
>> body.  Read more at Certified E-Mail with Comodo and Thunderbird<http://abiusx.com/certified-e-mail-with-comodo-and-thunderbird/> in
>> AbiusX.com <http://abiusx.com/>
>>
>> On Sep 15, 2013, at 12:52 AM, rahul chaudhary <
>> rahul300chaudhary400 at gmail.com> wrote:
>>
>> Hello All,
>>
>> I have been worried about this issue for a long time and I think I can
>> safely bring this issue here. *What to do with the user entered stings?*I mean we have to check them for possible anomalies. So, is there anything
>> in the PHP or other libraries that we can use, or we will make our own ones
>> in the second version. In any case, I would like to discuss our strategy.
>>
>> --
>> Regards,
>> Rahul Chaudhary
>> Ph - 412-519-9634
>>  _______________________________________________
>> OWASP_PHP_Security_Project mailing list
>> OWASP_PHP_Security_Project at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp_php_security_project
>>
>>
>>
>
>
> --
> Regards,
> Rahul Chaudhary
> Ph - 412-519-9634
>
>
>


-- 
Regards,
Rahul Chaudhary
Ph - 412-519-9634
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp_php_security_project/attachments/20130915/4e14db88/attachment-0001.html>


More information about the OWASP_PHP_Security_Project mailing list