sag47 |
01-19-2014 09:09 PM |
Quote:
Originally Posted by siemaeniu500
(Post 5101170)
So why it exist?
|
You can do what you like I'm just giving you advice as a professional. A simple search in the National Vulnerability Database is proof enough. Most script kiddie toolkits come with exploits to software like phpmyadmin, webmin, etc. If you still insist on using it then I highly recommend you learning how to secure it. Here's a few tips from a website. Personally, I wouldn't run it and simply use MySQL directly from the CLI with a firewall enabled on the serving ports.
Just because it exists does not mean it is the best tool to use.
|