Server Personal 1- What is the profile of local (localhost)? Is a program that converts your device into a microphone or a miniature server that allows you to apply and run Scripts in PHP and also allows you to install those scorpions and link them to a special database within your personal server and here appeared The great importance of it is helping programmers, developers and laptops in browsing and examining the scorpions with ease and easily 2- Some languages and how to identify and benefits of different languages? The first language after PHP Language Come on (Perl) is recognized as soon as I see the first line you find this code #! / USR / BIN / PERL and find the files programmed in that language with the second gaffe in terms of power Python Python) a lot of problems skip in most servers after preventing a lot of PHP and also not permission to play PERL files and are recognized through the line #! / USR / BIN / Python and find programmed files In this language, the 4-language PY (Ruby) is using this language in programming gaps and is recognized from the line. #! / USR / BIN / RUBY and find the programmed files on the G-B The latter is C (C) of course all written gaps are known to this language with its high trigger and are famous for writing attitudes or scorpions for the withdrawal of the Director's replacement and recognized through the presence of the command line #Include finds the programmed files with the C 3-Explit (Explits)? Are executive programs implemented through the browser. It has a URL, these oxytes offer location files and some have access to the server and roaming, and there are no exhibitors to launch an attack on Port from the server for his crusher's work, and this is called Buffer Over Flow Exploits. There are types of oxplications, including CGI Exploits or CGI Bugs, including Unicodes Exploits, including Buffer Over Flow Exploits, and the PHP Exploits, In which DOS Exploits, which is carried out by the service blocking, if any gap is found, and if not on the server, which is not on the Fire Wall. There are some bruises written in the language of C and its extension (.c). These species are particularly compiler or a program to translate them and contain any antiques into a normal executive executor used through the browser, and to convert the oxplications in this Language to an executive program, we need either operating system Linux or Unix, or to any compaeler works within the Windows operating system. The most famous of these complaints (transformations or transformers) is a program named Borland C ++ Compiler and is operating under the Windows operating system as mentioned earlier. What are gaps and what is interested? The gaps are mistakes by programmer at one of the language codes so that you can penetrate access to sensitive information on the server, such as the name of membership and the Pacific for the site manager, and many of the most famous gaps I kinds like injaction or blind have a lessons, God willing, gaps and methods discovered and exploited by the Safe Mode? It is one of the characteristics that hinder the hacking work in terms of which they are being denied navigating on the server and also prevents a lot of Apache software applications that we find that the most major companies do not use that property to avoid damage to SOSPTATS Host has what Open Basedir? Come on also a property within the server that prevents some serious functions that can be used by the hacker for execution. It is about its own in the BCH when activated by the backslash on 'or "or" and the benefit of this is prevented from passing the sound icons to avoid some types of gaps # 1605; SQL Injection When we send information we want to be changed like you're the best if you are an alleged boots printing next you \' Re The Best and if you do not take the boots, you are so you're the best Maho The Best and Data Data (Config)? Hua scours different from the opposite designed in configuring and connecting the scarrative database such as VB or Joomla