SEARCH KEYWORD -- Content
Some hidden XSS injection vulnerabilities
XSS injection refers to a Web page generates some unexpected executable js codes based on user input and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...
XSS,PHP,Security,Code,JavaScript 2012-08-27 20:32:08
5 good anti SOPA designs
The Stop Online Piracy Act (SOPA) is a United States bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Its goal is to protect the intellectual-property market and corresponding industry, jobs and revenue. However since its proposal, many organizations protest against it as they believed it would threaten free speech and innovation, and enable law enforcement to block access to entire internet domains due t...
Why cannot Renren be China's Facebook?
Yizhou Chen, CEO of China's SNS community Renren, shouted "one war, three battles". We do not know now how the battle progresses. Currently Renren's net market value is $1.3 billion where 900 million of them are in cash, it means the market values Renren 400 million US dollars only which is far lower than Facebook. Why cannot Renren be China's Facebook? This is a very interesting topic, many users share their opinions, Some of the main points are summarized as follows:Facebook pay more attentio...
Instagram has more than 100 million users
On TechCrunch Disrupt, Facebook CEO Mark Zuckerberg said that Instagram users is over $100 million.According to comScore data, Instagram traffic in July rose 38%, it becomes the 56th site in United States. And Instagram official said that the number of users was 80 million and over four billion photos uploaded to the server in July.Last week, Facebook formally completed the acquisition of Instagram, the final cost is $735 million. Zuckerberg says he wants to help the growth of the application, ...
GitHub : Code is the most direct way for programmers to communicate
If not invested by Andreessen Horowitz, GitHub might not be noticed by Forbes, CNN, New York Times. People didn't know this tool because it was very far away from the world -- GitHub is a project hosting service used by programmers.But to some programmers, it is not just a place for project hosting, it is`also the hub for open source projects, a place for programmers improving themselves and a social network for programmers.There are around 3.26 million projects hosted on GitHub currently, inclu...
GitHub,Open source,Hosting,Social 2012-07-20 11:38:31
6 necessary WordPress plugins for personal blogs
WordPress is now adopted by most bloggers, it has various themes and powerful plugins. There are lots of amazing plugins can be chosen such as spam comment filers and sitemap generators. For novice WordPress users, you may be confused about which plugin to choose, here we share with you 6 necessary WordPress plugins. Akismet Akismet is a built-in WordPress comment plugin. It checks your comments against the Akismet web service to see if they look like spam or not and lets you review the spam it ...
WordPress plugin,Comment,Sitemap 2013-08-05 03:18:40
How to monitor user behavior in webpage
Sometimes there is a need for website owners to monitor user behavior on the site so that they can know what pages are mostly visited and which parts are more popular so that they can provide better service to their users. These behavior usually contain user clicks, user mouse over events etc. These data can be sent back to server when triggered with some meta data. In this post, we will cover a few ways to monitor user behavior on a web portal and send data back to backend sever. 1. Synchronous...
HTML,BEACON API,PING,USER BEHAVIOR 2019-06-29 06:06:59
Never ever touch a programmer
This is a technical license plate block example. We don't know whether it is working or not, however, the idea is very good. When you drive through some of the junctions, the camera captures the license number and convert it into text with OCR, and then insert them into the database. Therefore, this license plate on the car becomes a SQL injection. This picture tells us -- never trust user input.Author : 陈皓 Source : http://coolshell.cn/articles/6639.html#more-6639...
Programmer,SQL injection 2012-04-21 01:19:48
Office will finally be on iOS and Android in 2013
It was confirmed that Office would land on iOS and Android platforms by Microsoft in October. Microsoft claims that Office will be on these two platforms in some way. Now many sources indicated that Office will be officially launched at the beginning of 2013. It is reported that the mobile version of Office will be free on Android and iOS, it allows users to view Office documents. Mobile version of Office also requires a Microsoft account just like SkyDrive and OneNote App. After login, users c...
Office,Android,iOS,Office 365 2012-11-07 11:57:50
Chrome time machine : Chrome starts from 0 to 1
Time flies, Chrome has been around us for four years since its birth. The Chrome team launched a Chrome time machine on Google's official blog, you just need a simple click or scroll back and forth with mouse, it will show you what happened to Chrome in last four years. If you find clues hidden between the lines, type a few mysterious characters, you may also be able to find a special birthday gift prepared by Chrome team.Four years, Chrome started from scratch and now it's the No.1 web browser...
Chrome time machine,4 years 2012-09-05 06:54:05
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>