MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
New Architect
April 2002
Al Williams
A Cookie by Any Other Name Is it safe to use cookies again? mark for My Articles similar articles
Linux Journal
August 2000
Reuven M. Lerner
At the Forge Session Management with Mason. This Perl-based web helper and MySQL work together to let you quickly build a user registration system for your web site. mark for My Articles similar articles
Linux Journal
October 1, 2002
Nuno Loureiro
Programming PHP with Security in Mind Writing code that prevents some common types of attacks is rather easy -- here are some guidelines. mark for My Articles similar articles
JavaWorld
April 2002
Michael Juntao Yuan & Ju Long
Track wireless sessions with J2ME/MIDP Every e-commerce application must support session tracking. Unfortunately, MIDP, a J2ME technology, supports only the standard HTTP protocol, which is stateless. This article explores ways to add session support into the current MIDP network API framework... mark for My Articles similar articles
JavaWorld
April 2002
Sonal Bansal
A recipe for cookie management Client-side HTTP state management is important for creating Java applications that need to interact with Web applications like browser-based email or online banking services. This article presents a cookie library for robust and easy client-side HTTP state management in Java... mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
JavaWorld
January 2001
Thomas E. Davis & Craig Walker
Take control of the servlet environment, Part 3 Browser cookies are wolves in sheep's clothing. Developers use these incredibly simple and useful mechanisms to create Web-based applications that rely on the persistence of sessions. However, cookies feature an odd little problem in relation to subdomains... mark for My Articles similar articles
JavaWorld
January 2002
Yuan & Long
Build database-powered mobile applications on the Java platform This article explains how to create mobile database applications using the Java 2 Platform, Micro Edition/Mobile Information Device Profile (J2ME/MIDP) and the Java 2 Platform, Enterprise Edition (J2EE). The authors introduce an architecture that uses JavaServer Pages (JSPs) as middleware between a MIDP frontend and a database backend. They also explain specific design decisions and implementation issues, such as persistent storage, network connection, session management, and data communication. Their discussion focuses on the integration between the client and server-side Java applications. mark for My Articles similar articles
Linux Journal
November 2001
Michael Yuan
Linux in Education: Implementing a Research Knowledge Base Keeping up with large volumes of research requires a system both flexible and intuitive... mark for My Articles similar articles
Searcher
August 2000
Josh Duberman & Michael Beaudet
Privacy Perspectives for Online Searchers: Confidentiality with Confidence This article presents some of the issues and questions involved in online privacy from the information professional's perspective. We offer it as a resource for making more informed decisions in this rapidly changing area. mark for My Articles similar articles
JavaWorld
August 2001
Rinaldo Di Giorgio
Serve clients' specific protocol requirements with Brazil, Part 5 How to use Brazil to process content from diverse Websites, tailor the content to reflect a user's desires, and provide the content as a Web service -- and how to use Brazil to integrate new technologies with legacy Web applications that aren't XML-enabled... mark for My Articles similar articles
JavaWorld
December 2000
Thomas E. Davis, Craig Walker
Take control of the servlet environment, Part 2 Implement a wrapper that gives you greater control over session management. Session state can be stored in the browser, in the server's memory, or in the database. You can have all three solutions at your fingertips, painlessly interchangeable... mark for My Articles similar articles
InternetNews
February 7, 2008
Andy Patrizio
Web 2.0: Unsafe At Any Speed? People who specialize in Web security are saying Web 2.0 as it is now can't be secured. Should we keep on this path? mark for My Articles similar articles
PC World
June 1, 2000
Matt Lake
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. mark for My Articles similar articles
Linux Journal
February 2001
Dan Teodor
Web Servers and Dynamic Content Using legacy languages like C and Fortran can aid computationally complex web applications... mark for My Articles similar articles
PC World
April 2006
Scott Spanbauer
Take Charge of What Web Sites Know About You Control cookies, clear your download history, and take other steps to keep snoops off your online trail. mark for My Articles similar articles
InternetNews
December 21, 2007
Sean Gallagher
With Google/DoubleClick Approved, is Privacy Dead? The Google-DoubleClick merger creates a uniquely large single lightning rod for privacy activists to get up in arms over. mark for My Articles similar articles
JavaWorld
July 2001
Todd Sundsted
Secure your Java apps from end to end, Part 2 Little mistakes during application development often lead to big security problems for developers and users. This article introduces the most common types of design and implementation flaws that turn into security vulnerabilities and describes how to avoid them... mark for My Articles similar articles
PC World
March 26, 2001
Dennis O'Reilly
Three Tools That Make Cookies More Palatable Some Internet cookies are helpful, some are harmful. These three tools help you distinguish friend from foe... mark for My Articles similar articles
PC World
November 9, 2001
Jennifer DiSabatino
IE Hole Reveals Users' Cookie Data Microsoft is working on patch, but for now malicious sites could siphon information from IE 5.5 and 6.0... mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
Linux Journal
October 9, 2001
Eric Rescorla
An Introduction to OpenSSL Programming, Part II of II This article shows how to use a number of advanced features such as session resumption and client authentication... mark for My Articles similar articles
Scientific American
September 2006
Tom Leighton
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. mark for My Articles similar articles
InternetNews
October 11, 2004
Ryan Naraine
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. mark for My Articles similar articles
PC World
April 9, 2001
Andrew Brandt
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... mark for My Articles similar articles
Popular Mechanics
January 2009
Joe Pappalardo
Four Ways to Fight Back Against Cyber Attacks Your webcam, cell phone, web browsers, and personal e-mails are all vulnerable to attack from thieves in cyberspace. Here are four ways to fight back. mark for My Articles similar articles
Linux Journal
July 2000
Enrique Canessa & Clement Onime
Low-Bandwidth Communication Tools for Science No access to the Internet? Browse the Web via e-mail instead! Off-line browsing via web-to-e-mail servers such as www4mail is still a reality from remote areas of the world, and most likely will remain so, as the number of Internet users is expected to double by the year 2005. mark for My Articles similar articles
CIO
April 15, 2004
Eric Knorr
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets mark for My Articles similar articles
Salon.com
May 7, 2001
Scott Rosenberg
Defending the cookie monster There are lots worse things in the world than Web sites leaving cookies on your computer... mark for My Articles similar articles
PC Magazine
November 2, 2005
Matthew D. Sarrel
Cookies and PIE You know to be wary of cookies. Could persistent indentification elements be a bigger threat? mark for My Articles similar articles
PC Magazine
September 2, 2003
Warren Ernst
Making Cookies Despite their bad press, cookies are a good way to personalize a visitor's experience at your site. We show you how to start using them. mark for My Articles similar articles
InternetNews
January 30, 2004
Ryan Naraine
IE Patch Could Disrupt E-Commerce A planned fix for URL spoofing browser flaws could return error messages on Web sites that use clear text to authenticate user names and passwords. mark for My Articles similar articles
InternetNews
January 29, 2004
Ryan Naraine
Microsoft to Strike IE URL Passwords The browser will be modified to fix a known URL-spoofing flaw used by Web scammers. mark for My Articles similar articles
PC World
April 2003
Scott Spanbauer
Internet Tips: Protect Your PC and Data With the Security Checklist Follow these essential steps for your PC security. mark for My Articles similar articles
PC Magazine
September 14, 2011
Samara Lynn
Hands On: Windows Server 8 Microsoft is calling Windows Server 8 a "game-changer." They might be right. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
InternetNews
March 20, 2008
Sean Michael Kerner
Can We Fix The Web? The problem with the modern Web is that it's insecure and fixes may be a long time coming. mark for My Articles similar articles
PC World
May 2001
Brad Grimes
Privacy Matters Marketers would love to find out all about you and your online activities. But what personal data should you let them obtain? We report on recent developments in Net surveillance and their effect on you... mark for My Articles similar articles
InternetNews
September 15, 2004
Ryan Naraine
Critical Flaws Flagged in Mozilla, Thunderbird The vulnerabilities could enable malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. mark for My Articles similar articles
InternetNews
August 5, 2004
Ryan Naraine
Critical Flaws Spoil Opera Tune Opera updates its flagship browser to plug a series of potentially serious security holes. mark for My Articles similar articles
PC World
April 20, 2001
Scott Spanbauer
Mend Your E-Mail's Broken Links Mend broken links in e-mail, unmask disguised Web page advertising, check browser security settings, catalog your MP3s... mark for My Articles similar articles
InternetNews
April 13, 2004
Sharon Gaudin
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. mark for My Articles similar articles
InternetNews
March 9, 2010
Blue Coat Backing Armored Browser Networking and security firm offers commercial support for Quaresso, a startup offering a new spin on the armored browser with remote support to shore up the last mile. mark for My Articles similar articles
PC World
November 2001
Scott Spanbauer
Internet Tips: Free Tool Nabs Web Bugs Stalk and block clear-GIF Web bugs, use IE's P3P to crumble cookies, e-mail long URLs with ease... mark for My Articles similar articles
PC World
September 2004
Stan Miastkowski
Cut the Clutter and Add Power to Your Browser Web browsers can use substantial amounts of computer resources, and their temporary files can hog huge amounts of disk space. Updates, add-ons, housekeeping--and even using an alternative browser--can improve your surfing experience. mark for My Articles similar articles
PC World
August 2002
Scott Spanbauer
Internet Tips: Listen to a World of Radio Stations on the Internet Don't limit your choice of media players or music... How to manage cookies with various browsers... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
June 25, 2004
Ryan Naraine
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. mark for My Articles similar articles
PC World
March 18, 2001
Top 5 Cookie Managers Block cookie files, or choose to accept them, before they reach your hard drive. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles