phpMyAdmin(MySQL数据库管理) V4.7.5多国语言安装版

2(50%)2(50%)更新时间:2017-10-24

软件大小:9.74 MB软件类型:国外软件

软件语言:简体中文软件授权:免费软件

评级:应用平台:WinXP

软件介绍下载地址相关文章猜你喜欢相关评论

phpMyAdmin (MySQL数据库管理)是一个用PHP编写的,可以通过互联网控制和操作MySQL。通过phpMyAdmin可以完全对数据库进行操作,例如建立、复制/删除数据等等。 管理 MySQL-server 以及单一数据库的 PHP 程序,对于不熟悉 MySQL 命令列指令的人来说,是很方便的管理工具。

phpMyAdmin 是一个用PHP编写的,可以通过 web方式控制和操作MySQL数据库。通过 phpMyAdmin 可以完全对数据库进行操作,例如建立'复制'删除数据等等。如果使用合适的工具,MySQL 数据库的管理就会变得相当简单。应用 MySQL 命令行方式需要对MySQL 知识非常熟悉,对 SQL语言也是同样的道理。不仅如此,如果数据库的访问量很大,列表中数据的读取就会相当困难。

phpMyAdmin功能

phpMyAdmin可以管理整个MySQL服务器(需要超级用户),也可以管理单个数据库。为了实现后一种,你将需要合理设置MySQL用户,他只能对允许的数据库进行读/写。那要等到你看过MySQL手册中相关的部分。

phpMyAdmin安装教程

1.下载多国语言包
解压好后更名为 phpmyadmin 注意全是小写的,把它放在 \文件夹\htdocs下
2.将config.sample.inc.php 更名为 config.inc.php
3,配制 config.inc.php
修改 $cfg['Servers'][$i]['controluser'] 把前面的 //去掉,在后面写上数据库名字 如 'root'
$cfg['Servers'][$i]['controlpass'] 把前面的// 去掉,在后面写上数据库密码,如'123'
修改$cfg['blowfish_secret'] = '' 在后面'' 里面随便填上几个数字 '456'
4. 配制服务器的php.ini
将php下的 libmcrypt.dll 复制到 C:\WINDOWS\system32
修改php.ini
将 ;extension=php_mcrypt.dll前的;去掉
5,重启apache即可

安装过程

PhpMyAdmin安装包下载安装

解压

将下载文件解压缩到 WEB 访问路径下。文件目录如phpmyadmin。

配置文件

然后配置目录下libraries文件下的 config.default.php 文件。

$cfg['PmaAbsoluteUri'] = ‘http://localhost/phpmyadmin’;

$cfg['blowfish_secret'] = ’123456′;

$cfg['DefaultLang'] = ‘zh-gb2312′;

$cfg['DefaultCharset'] = ‘gb2312′;

$cfg['Servers'][$i]['auth_type'] = ‘cookie’;

保存之后,在浏览器里输入:http://localhost/phpmyadmin/user_password.php

更新日志

phpMyAdmin 4.6.4 更新日志

- issue [security] Weaknesses with cookie encryption, see PMASA-2016-29

- issue [security] Improve session cookie code for openid.php and signon.php example files

- issue [security] Full path disclosure in openid.php and signon.php example files

- issue [security] Multiple XSS vulnerabilities, see PMASA-2016-30

- issue [security] Multiple XSS vulnerabilities, see PMASA-2016-31

- issue [security] Unsafe generation of BlowfishSecret (when not supplied by the user)

- issue [security] Referrer leak when phpinfo is enabled

- issue [security] PHP code injection, see PMASA-2016-32

- issue [security] Full path disclosure, see PMASA-2016-33

- issue [security] SQL injection attack, see PMASA-2016-34

- issue [security] Local file exposure through LOAD DATA LOCAL INFILE, see PMASA-2016-35

- issue [security] Local file exposure through symlinks with UploadDir, see PMASA-2016-36

- issue [security] Path traversal with SaveDir and UploadDir, see PMASA-2016-37

- issue [security] Multiple XSS vulnerabilities, see PMASA-2016-38

- issue [security] SQL injection vulnerability as control user, see PMASA-2016-39

- issue [security] SQL injection vulnerability, see PMASA-2016-40

- issue [security] Denial-of-service attack through transformation feature, see PMASA-2016-41

- issue [security] SQL injection vulnerability as control user, see PMASA-2016-42

- issue [security] Verify data before unserializing, see PMASA-2016-43

- issue [security] Use HTTPS for wiki links

- issue Remove Swekey support

- issue [security] SSRF in setup script, see PMASA-2016-44

- issue [security] Denial-of-service attack with $cfg['AllowArbitraryServer'] = true and persistent connections, see PMASA-2016-45

- issue [security] Improve SSL certificate handling

- issue [security] Fix full path disclosure in debugging code

- issue [security] Possible circumvention of IP-based allow/deny rules with IPv6 and proxy server, see PMASA-2016-47

- issue [security] Detect if user is logged in, see PMASA-2016-48

- issue [security] Bypass URL redirection protection, see PMASA-2016-49

- issue [security] Referrer leak, see PMASA-2016-50

- issue [security] Reflected File Download, see PMASA-2016-51

- issue [security] ArbitraryServerRegexp bypass, see PMASA-2016-52

- issue [security] Denial-of-service attack by entering long password, see PMASA-2016-53

- issue [security] Remote code execution vulnerability when running as CGI, see PMASA-2016-054

- issue [security] Administrators could trigger SQL injection attack against users

- issue [security] Denial-of-service attack when PHP uses dbase extension, see PMASA-2016-55

- issue [security] Remove tode execution vulnerability when PHP uses dbase extension, see PMASA-2016-56

- issue [security] Denial-of-service attack by using for loops, see PMASA-2016-46

- issue Include X-Robots-Tag header in responses

- issue Enforce numeric field length when creating table

- issue Fixed invalid Content-Length in some HTTP responses

- issue #12394 Create view should require a view name

- issue #12391 Message with 'Change password successfully' displayed, but does not take effect

- issue Tighten control on PHP sessions and session cookies

- issue #12409 Re-enable overhead on server databases view

- issue #12414 Fixed rendering of Original theme

- issue #12413 Fixed deleting users in non English locales

- issue #12416 Fixed replication status output in Databases listing

- issue #12303 Avoid typecasting to float when not needed

- issue #12425 Duplicate message variable names in messages.inc.php

- issue #12399 Adding index to table shows wrong top navigation

- issue #12424 Fixed password change on MariaDB without auth plugin

- issue #12339 Do not error on unset server port

- issue #12422 Improvements to the original theme

- issue #12395 Do not try to load old transformation plugins

- issue #12423 Fixed replication status in database listing

- issue #12433 Copy table with prefix does not copy the indexes

- issue #12375 Search in database: Window content is not scrolling down when clicking first time on Browse link

- issue #12346 SQL Editor textareas can have their size increased from the top, distorting the page view

下载地址 / Download

下载不了?点击报错

相关文章 / Related Articles

猜你喜欢 / Guess You Like

评论

0/120
发表评论

评论内容不能为空

回顶部去下载