SEARCH KEYWORD -- Web content
Top 10 PHP Best Security Practices for Sys Admins
PHP is widely used for various of web development. However, misconfigured server-side scripting would create all sorts of problem. And here are php security best practices that you should aware when configuring PHP securely. Nowadays most of the web servers are operated under Linux environment (like: Ubuntu, Debian...etc). Hence, in the following article, I am going to use list top 10 ways to enhance PHP Security Best Practices under Linux environment. My sample setup for PHP Security Tips: D...
PHP,code security,System admin,Advice,Best practice 2012-02-01 00:04:37
HTML5 Can Get the Job, But Can HTML5 Do the Job?
This post is part of our ReadWriteMobile channel, which is dedicated to helping its community understand the strategic business and technical implications of developing mobile applications. This channel is sponsored by Alcatel-Lucent. As you're exploring these resources, check out this helpful resource from our sponsors: Cultivating a Developer Ecosystem: Understanding Their Needs HTML5 is changing the way that developers create applications for the mobile Web. Yet, it is not the be a...
HTML5,Future,Job,New feature 2011-08-12 07:45:29
PHP to get long running process progress dynamically
Frequently in web applications, we may have a request to the back end system which may trigger a long running process such as searching huge amount of data or a long running database process. Then the front end webpage may hang and wait for the process to be finished. During this process, if we can provide the user some information about the progress of the back end process, it may improve user experience. Unfortunately, in web applications, this seems not an easy task because web scripting lang...
AJAX,PHP,progress,long process,demo 2012-06-04 07:29:37
JavaScript Attack/Defend
As developers and designers we work hard to build visually attractive, fast and easy to maintain applications. Our goals are to make sure the applications we build stick to users and keep them coming back for more. Security is not always at the forefront of our minds. No one intentionally builds insecure software but often a lack of security knowledge leads developers to build vulnerabilities into their applications. In this article we are going to examine two web security attacks, how they are ...
JavaScript,Attack,Defend,Security,Cross site 2011-10-13 13:09:11
HTML above flash (transparency + z-index)
We have faced this problem many of the times. When we want to display some message on top of all layers on a page or use some feature like jQuery light boxes. Normally the flash file continues to shine through the page. No matter what you do with layering the dom elements using z-index.See the layering flash content problem definition here.Before this, people used to dodge this issue with some fixes like hiding the flash area completely and then showing a static image of...
HTML,Flash,Above,z-index,wmode,transpare 2011-05-01 15:46:34
Less Is More
I originally assumed that open source was simply a means of producing technology. But technology is just a lovely byproduct, the real goal is social. Not all open source projects work this way, but perhaps they should. I stumbled upon this realization while maintaining fog as it grew and grew and grew. Leaving issues open seemed unbearable, but over time the volume far exceeded my ability to keep up. Over time I saw the promise of a better way, but my expectations of open source would need to a...
Open source,Less is more,Mentoring,Bug report 2011-11-28 10:45:47
Coder or Clown?
That’s the challenge. Sit down with someone you’ve never met and try to work out if they are a coder or a clown. I don’t mean to insult anyone, of course, and I’m the first to acknowledge the years of training and effort that goes into being a professional clown. But some coders, oh boy. Like the time I interviewed a recent graduate. I’ll call her Ada. Full of sympathy for the novice programmer I started with a gentle warm-up, a soft-ball question to break the ...
Yahoo is going to recycle inactive user IDs
According to Sina Tech, Yahoo announced that it would provide users with shorter, more lovely and more memorable Yahoo IDs starting from July 15. For IDs like emily@yahoo.com, if they are in inactive status in the past 12 months, then other users will be able to get this ID. Yahoo plans to reset Yahoo ID system to help users get the ID they want in mid of July. By mid-August, users who apply for a Yahoo user ID will be informed what kind of ID they get.This means that users can apply multiple ID...
Yahoo,ID recycle 2013-06-12 21:22:15
Nokia fires the Qt team
Recently, Nokia announced that they would lay off around 10000 employees, 700 of them are developers. Among these 700 developers, 100 are the core developers of the open source project Qt.Nokia is the main sponsor of the open source project Qt. According to Mirko Boehm, the core Qt team has around 100 people, this means that Nokia fires the whole Qt team.He criticized Nokia's decision, he thought that a responsible CEO should persuade the team to move to other platforms.Qt team is experienced, t...
One minute to understand earnings report of IT giants in last quarter
According to Sohu IT, if you want to know the operating status of a listed technology company, then the company's quarterly earnings report should not be missed. Now it's time for companies to release earnings report for last quarter, a few large IT giants in United States have announced the previous quarter's earnings. But many ordinary readers are not interested in those professional reports with a lot of finance jargon, so we extracted and summarized some important information from Yahoo, Goo...
Earnings report,IT giant 2013-04-27 10:05:38
RECENT
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- more>>