sfox            Mon Jan 31 07:53:29 2005 EDT

  Modified files:              
    /phpdoc/en/security errors.xml 
  Log:
  Getting rid of the E_NONE myth, and also incorporating a user note.
  
http://cvs.php.net/diff.php/phpdoc/en/security/errors.xml?r1=1.6&r2=1.7&ty=u
Index: phpdoc/en/security/errors.xml
diff -u phpdoc/en/security/errors.xml:1.6 phpdoc/en/security/errors.xml:1.7
--- phpdoc/en/security/errors.xml:1.6   Thu Aug 12 21:00:48 2004
+++ phpdoc/en/security/errors.xml       Mon Jan 31 07:53:28 2005
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.6 $ -->
+<!-- $Revision: 1.7 $ -->
 <!-- splitted from ./index.xml, last change in rev 1.66 -->
   <chapter id="security.errors">
    <title>Error Reporting</title>
@@ -100,7 +100,13 @@
     By testing your code, prior to deployment, with E_ALL, you can
     quickly find areas where your variables may be open to poisoning
     or modification in other ways. Once you are ready for deployment,
-    by using E_NONE, you insulate your code from probing.
+    you should either disable error reporting completely by setting
+    <function>error_reporting</function> to 0, or turn off the error
+    display using the &php.ini; option <literal>display_errors</literal>,
+    to insulate your code from probing. If you choose to do the latter,
+    you should also define the path to your log file using the
+    <literal>error_log</literal> ini directive, and turn
+    <literal>log_errors</literal> on.
     <example>
      <title>Finding dangerous variables with E_ALL</title>
      <programlisting role="php">

Reply via email to