Step 2: Require the use of secure passwords
Step 3: Check the permissions of configuration files
Step 4: Encrypt client-server transmissions
Step 5: Disable remote access
Step 6: Actively monitor the MySQL access log
http://www.builderau.com.au/pr...SQL/0,39028784,39266102,00.htm
+
http://dev.mysql.com/doc/refman/5.0/en/security.html
Quaerite et invenietis | Everything in life is Luck -- Donald Trump | http://www.akcenat.info | Momenat – Vaša instant doza vesti | Part Time Freelance Journalist