Wednesday, January 25, 2012

The Security of CGI Scripts

By Paul Stradford


Notorious as a main cause of security breaches, CGI scripts are very popular and almost certainly are running on every Web server. The CGI (Common Gateway Interface) protocol itself is secure, but CGI scripts are very often not written by programmers with security in mind. As a result, Web Masters frequently install them on web sites, oblivious to the risks they are taking.

Due to this behemoth forward push in software and hardware many of the obstacles that once stood in the way of designers and creatives are being steadily bulldozed. This obviously brings with it new challenges and learning curves but also new ways to become cross disciplined, combining new techniques and approaches that are the catalyst for inspiration and satisfaction. This article aims to briefly touch on a few of the limitless possibilities that can be achieved when combining 3D visualisation and photography.

The first and most obvious use of combining 3D visualisation and photography is quite simply, presentation of 3D or CGI renders. Of course this is dependent on the purpose of the render and the nature of the object being modelled, however it is worth bearing in the mind the sense of scale and place that can be achieved by combining photography with you 3D render, while very possibly reducing creation time for a poly-heavy scene. For example, instead of using 'out of the box' materials, textures or sky domes (for image based lighting) take your own photographs that match more closely to the overall effect you wish to achieve. This firstly offers much more control but more importantly result in more personal and unique imagery and with careful thought prior to taking your photographs, an increased sense of realism.

With this use of CGI, companies can create mock-ups of their products - whether architectural or otherwise - and see how they will look and act (within reason) before they are actually made. The software is extremely versatile and powerful, and produces replicas of the desired product that rival photographs in their quality. In fact, it is now becoming increasingly difficult to spot the difference between a photo or artist's representation and a CGI model, such is the detail of the processes used.

The process begins by forming a framework of the object or space to be modelled - say, a room or internal space to be designed. This is then filled with its contents - furniture, fixtures, and so on - to produce a simple 3D line version of the space. After that, the fun starts. This initial rendering can be customised in limitless ways, by adding colour, lighting, texture and other variables, all virtually on the computer screen. If you want, the process can be captured as an animation, showing exactly how it happens in stages from start to finish - even with music and commentary, if you want.

The wrapper is positioned between the CGI script and the Web server software, thus keeping them apart from each other. It alters the user's identity, thus isolating the script from the Web Master's identity and from all other scripts.

The easiest route to secure CGI scripts is to use CGI libraries to control the input and output to and from the Web server. Because CGI libraries contain well established pre-defined, secure programs, tried and tested to rigorous standards, the Web Master and the CGI programmer can be relieved of much of the security burden.




About the Author:



0 comments: