modern-web-design-and-development
When you hover over any presentation of code on his website, you’ll notice that the block expands to the right (probably via jQu ...
The laurel wreath in the background and the distinctive illustration immediately distinguish this website as belonging to A List ...
This screenshot doesn’t do justice to the website’s look and feel; you’ll have to poke around to really experience it for yourse ...
Usable Doesn’t Have To Mean Ugly My purpose here was not to tell designers to forget about slickness, sexiness and beauty. This ...
Web Security: Are You Part of the Problem? Christian Heilmann Website security is an interesting topic and should be high on the ...
Disclaimer: the things we’ll talk about in this article today won’t make you a security expert, just as buying a Swiss Army knif ...
newer threat, clickjacking, and a user interface issue called phishing. You may have to deal with all of these as a Web develope ...
with a? and separated by ampersands. If you want to search for puppies on Google, for example, you can use the URI http://www.go ...
On the search results page, you can see the pagination links at the bottom (the 1 2 3 and so on under the Gooooooogle logo), and ...
XKCD comic showing how SQL injection would delete a database. Cross-Site Scripting (XSS) Cross-site scripting is probably the bi ...
14 15 <style type="text/css" media="screen"> (^16) #intro{ (^17) / color is set by PHP / (^18) color:<?php echo $color; ...
XSS, but we could do anything that a JavaScript is allowed to do. You can see the results in the following screenshot: Once you ...
xssed.org The remedy for XSS is to be very paranoid about anything that comes via forms or the URI. You also need to be sure tha ...
following screenshot is of me accessing the database of a sandwich company, sending emails from their server and reading the ord ...
1 http://www.example.com/cgi/food_db/db.cgi? db=default&uid=default&Category=Sandwiches&Subcategory=Sandwiche s& ...
(^4) (^5) (^6) (^7) email (^8) (^9) (^10) (^11) Comment (^12) (^13) (^14) 15 Forms can be sent by two methods: GET add ...
CSRF becomes even more dangerous when you are logged into and authenticated by a particular system. An image in any other tab in ...
You could even use JavaScript to automatically send the form or a script on another server to do the POST request from the back- ...
Phishing Phishing is the technique of fooling people into entering information into a bad website. You show end users an interfa ...
Twitter’s “Don’t Click” prank, explained Human nature being what it is, many people clicked the button, which seemingly did noth ...
«
7
8
9
10
11
12
13
14
15
16
»
Free download pdf