httpd 2.2.29 中文文档
the backend should be queried. When caching local resources, this drastically changes the security model of Apache. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very symbol resolving overhead the Unix loader now has to do. The server is approximately 5% slower at execution time under some platforms because position independent code (PIC) sometimes needs complicated assembler with us? Yes? Good. Let's move on! suEXEC Security Model Before we begin configuring and installing suEXEC, we will first discuss the security model you are about to implement. By doing so, you may better0 码力 | 1854 页 | 1.48 MB | 1 年前3httpd 2.2.27 中文文档
the backend should be queried. When caching local resources, this drastically changes the security model of Apache. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very symbol resolving overhead the Unix loader now has to do. The server is approximately 5% slower at execution time under some platforms because position independent code (PIC) sometimes needs complicated assembler with us? Yes? Good. Let's move on! suEXEC Security Model Before we begin configuring and installing suEXEC, we will first discuss the security model you are about to implement. By doing so, you may better0 码力 | 1849 页 | 1.47 MB | 1 年前3httpd 2.2.31 中文文档
the backend should be queried. When caching local resources, this drastically changes the security model of Apache. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very symbol resolving overhead the Unix loader now has to do. The server is approximately 5% slower at execution time under some platforms because position independent code (PIC) sometimes needs complicated assembler with us? Yes? Good. Let's move on! suEXEC Security Model Before we begin configuring and installing suEXEC, we will first discuss the security model you are about to implement. By doing so, you may better0 码力 | 1860 页 | 1.48 MB | 1 年前3httpd 2.2.27.dev 中文文档
the backend should be queried. When caching local resources, this drastically changes the security model of Apache. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very symbol resolving overhead the Unix loader now has to do. The server is approximately 5% slower at execution time under some platforms because position independent code (PIC) sometimes needs complicated assembler with us? Yes? Good. Let's move on! suEXEC Security Model Before we begin configuring and installing suEXEC, we will first discuss the security model you are about to implement. By doing so, you may better0 码力 | 1849 页 | 1.47 MB | 1 年前3httpd 2.2.32 中文文档
the backend should be queried. When caching local resources, this drastically changes the security model of Apache. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very symbol resolving overhead the Unix loader now has to do. The server is approximately 5% slower at execution time under some platforms because position independent code (PIC) sometimes needs complicated assembler with us? Yes? Good. Let's move on! suEXEC Security Model Before we begin configuring and installing suEXEC, we will first discuss the security model you are about to implement. By doing so, you may better0 码力 | 1866 页 | 1.48 MB | 1 年前3Apache HTTP Server Documentation Version 2.2
the backend should be queried. When caching local resources, this drastically changes the security model of Apache. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very symbol resolving overhead the Unix loader now has to do. • The server is approximately 5% slower at execution time under some platforms because position independent code (PIC) sometimes needs complicated assembler with us? Yes? Good. Let’s move on! suEXEC Security Model Before we begin configuring and installing suEXEC, we will first discuss the security model you are about to imple- ment. By doing so, you may0 码力 | 805 页 | 2.51 MB | 1 年前3Apache HTTP Server Documentation Version 2.0
symbol resolving overhead the Unix loader now has to do. • The server is approximately 5% slower at execution time under some platforms because position independent code (PIC) sometimes needs complicated assembler with us? Yes? Good. Let’s move on! suEXEC Security Model Before we begin configuring and installing suEXEC, we will first discuss the security model you are about to imple- ment. By doing so, you may environment to ensure safe operations? suEXEC cleans the process’ environment by establishing a safe execution PATH (defined during configuration), as well as only passing through those variables whose names0 码力 | 682 页 | 2.05 MB | 1 年前3httpd 2.4.23 中文文档
server should be queried just as an external cache would, and this drastically changes the security model of httpd. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very directive is set to Off, the full set of request processing phases are executed and the security model remains unchanged. Local exploits As requests to end-users can be served from the cache, the cache symbol resolving overhead the Unix loader now has to do. The server is approximately 5% slower at execution time under some platforms, because position independent code (PIC) sometimes needs complicated assembler0 码力 | 2559 页 | 2.11 MB | 1 年前3httpd 2.4.20 中文文档
server should be queried just as an external cache would, and this drastically changes the security model of httpd. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very directive is set to Off, the full set of request processing phases are executed and the security model remains unchanged. Local exploits As requests to end-users can be served from the cache, the cache symbol resolving overhead the Unix loader now has to do. The server is approximately 5% slower at execution time under some platforms, because position independent code (PIC) sometimes needs complicated assembler0 码力 | 2533 页 | 2.09 MB | 1 年前3httpd 2.4.25 中文文档
server should be queried just as an external cache would, and this drastically changes the security model of httpd. As traversing a filesystem hierarchy to examine potential .htaccess files would be a very directive is set to Off, the full set of request processing phases are executed and the security model remains unchanged. Local exploits As requests to end-users can be served from the cache, the cache symbol resolving overhead the Unix loader now has to do. The server is approximately 5% slower at execution time under some platforms, because position independent code (PIC) sometimes needs complicated assembler0 码力 | 2573 页 | 2.12 MB | 1 年前3
共 23 条
- 1
- 2
- 3