Updating in mysql

(checked on Cent OS 5.6 32bit) Cent OS Linux 5 normally comes installed with PHP 5.1.6.

updating in mysql-13

Cent OS guru recommend that you use it instead of Cent OS-Testing due to unstable test software. repository Connect the repository: # Cent OS-Testing: # !!!! # This repository is a proving grounds for packages on their way to Cent OSPlus and Cent OS Extras.

# They may or may not replace core Cent OS packages, and are not guaranteed to function properly.

# These packages build and install, but are waiting for feedback from testers as to # functionality and stability. PHP 5.3 will be installed Cent OS 5.6 and later includes php52-* in the standard repository.

Packages in this repository will come and go during the # development period, so it should not be left enabled or used on production systems without due # consideration. as it is required for correct operation of php-mysql. You may install them, but some problems may occur (for example, deletion of old php will uninstall phpmyadmin and squirrelmail).

[c5-testing] name=Cent OS-5 Testing baseurl= enabled=1 gpgcheck=1 gpgkey= OS-testing includepkgs=php* See also wiki.for more information on how to install additional packages. We recommend using the Atomic repository in the same way as for updating to PHP 5.2. Delete PHP 5.1 REMI contains the archive of earlier PHP versions including PHP 5.2 (they must be downloaded and installed manually, rather than via yum).

When installing a repository, the file in which the enabled=1 or enabled=0 option allows to "automatically" connect the repository is created in the /etc/yum.repos.d/ directory.

The post title may sound complicated, but it actually deals with a very simple problem and an even easier solution. It is insecure to store plain text passwords in the password database.

Sure it would be easy to programmatically check “does the password provided match what is in the database?

”, but then if anyone got a hold of the information in that database, your password would be immediately known and exploitable.

Comments are closed.