[drupal-devel] performance improvements - avoiding big
unserialize()
Craig Courtney
craig at dawnsedge.com
Fri Oct 21 18:49:24 UTC 2005
Using file system to store read/write information like this will be a
severe security risk for most hosting situations. As Herman pointed
out the user id that the php engine runs under (may be different than
web server when php is run as cgi) will have to have read/write
access to the file data store. In many shared hosting this means
that your information file will be read/writable for all other sites
hosted on your box.
Craig
On Oct 21, 2005, at 2:33 PM, Herman Webley wrote:
>
> 1. This file will have to be writeable by the web server.
> 2. This file will be writeable by the web server
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://drupal3.drupal.org/pipermail/development/attachments/20051021/d7277492/attachment.htm
More information about the drupal-devel
mailing list