Similar Articles |
|
New Architect April 2002 Al Williams |
A Cookie by Any Other Name Is it safe to use cookies again? |
Linux Journal August 2000 Reuven M. Lerner |
At the Forge Session Management with Mason. This Perl-based web helper and MySQL work together to let you quickly build a user registration system for your web site. |
Linux Journal October 1, 2002 Nuno Loureiro |
Programming PHP with Security in Mind Writing code that prevents some common types of attacks is rather easy -- here are some guidelines. |
JavaWorld April 2002 Michael Juntao Yuan & Ju Long |
Track wireless sessions with J2ME/MIDP Every e-commerce application must support session tracking. Unfortunately, MIDP, a J2ME technology, supports only the standard HTTP protocol, which is stateless. This article explores ways to add session support into the current MIDP network API framework... |
JavaWorld April 2002 Sonal Bansal |
A recipe for cookie management Client-side HTTP state management is important for creating Java applications that need to interact with Web applications like browser-based email or online banking services. This article presents a cookie library for robust and easy client-side HTTP state management in Java... |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
JavaWorld January 2001 Thomas E. Davis & Craig Walker |
Take control of the servlet environment, Part 3 Browser cookies are wolves in sheep's clothing. Developers use these incredibly simple and useful mechanisms to create Web-based applications that rely on the persistence of sessions. However, cookies feature an odd little problem in relation to subdomains... |
JavaWorld January 2002 Yuan & Long |
Build database-powered mobile applications on the Java platform This article explains how to create mobile database applications using the Java 2 Platform, Micro Edition/Mobile Information Device Profile (J2ME/MIDP) and the Java 2 Platform, Enterprise Edition (J2EE). The authors introduce an architecture that uses JavaServer Pages (JSPs) as middleware between a MIDP frontend and a database backend. They also explain specific design decisions and implementation issues, such as persistent storage, network connection, session management, and data communication. Their discussion focuses on the integration between the client and server-side Java applications. |
Linux Journal November 2001 Michael Yuan |
Linux in Education: Implementing a Research Knowledge Base Keeping up with large volumes of research requires a system both flexible and intuitive... |
Searcher August 2000 Josh Duberman & Michael Beaudet |
Privacy Perspectives for Online Searchers: Confidentiality with Confidence This article presents some of the issues and questions involved in online privacy from the information professional's perspective. We offer it as a resource for making more informed decisions in this rapidly changing area. |
JavaWorld August 2001 Rinaldo Di Giorgio |
Serve clients' specific protocol requirements with Brazil, Part 5 How to use Brazil to process content from diverse Websites, tailor the content to reflect a user's desires, and provide the content as a Web service -- and how to use Brazil to integrate new technologies with legacy Web applications that aren't XML-enabled... |
JavaWorld December 2000 Thomas E. Davis, Craig Walker |
Take control of the servlet environment, Part 2 Implement a wrapper that gives you greater control over session management. Session state can be stored in the browser, in the server's memory, or in the database. You can have all three solutions at your fingertips, painlessly interchangeable... |
InternetNews February 7, 2008 Andy Patrizio |
Web 2.0: Unsafe At Any Speed? People who specialize in Web security are saying Web 2.0 as it is now can't be secured. Should we keep on this path? |
PC World June 1, 2000 Matt Lake |
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. |
Linux Journal February 2001 Dan Teodor |
Web Servers and Dynamic Content Using legacy languages like C and Fortran can aid computationally complex web applications... |
PC World April 2006 Scott Spanbauer |
Take Charge of What Web Sites Know About You Control cookies, clear your download history, and take other steps to keep snoops off your online trail. |
InternetNews December 21, 2007 Sean Gallagher |
With Google/DoubleClick Approved, is Privacy Dead? The Google-DoubleClick merger creates a uniquely large single lightning rod for privacy activists to get up in arms over. |
JavaWorld July 2001 Todd Sundsted |
Secure your Java apps from end to end, Part 2 Little mistakes during application development often lead to big security problems for developers and users. This article introduces the most common types of design and implementation flaws that turn into security vulnerabilities and describes how to avoid them... |
PC World March 26, 2001 Dennis O'Reilly |
Three Tools That Make Cookies More Palatable Some Internet cookies are helpful, some are harmful. These three tools help you distinguish friend from foe... |
PC World November 9, 2001 Jennifer DiSabatino |
IE Hole Reveals Users' Cookie Data Microsoft is working on patch, but for now malicious sites could siphon information from IE 5.5 and 6.0... |
PC Magazine February 1, 2008 Eric Griffith |
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. |
Linux Journal October 9, 2001 Eric Rescorla |
An Introduction to OpenSSL Programming, Part II of II This article shows how to use a number of advanced features such as session resumption and client authentication... |
Scientific American September 2006 Tom Leighton |
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. |
InternetNews October 11, 2004 Ryan Naraine |
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. |
PC World April 9, 2001 Andrew Brandt |
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... |
Popular Mechanics January 2009 Joe Pappalardo |
Four Ways to Fight Back Against Cyber Attacks Your webcam, cell phone, web browsers, and personal e-mails are all vulnerable to attack from thieves in cyberspace. Here are four ways to fight back. |
Linux Journal July 2000 Enrique Canessa & Clement Onime |
Low-Bandwidth Communication Tools for Science No access to the Internet? Browse the Web via e-mail instead! Off-line browsing via web-to-e-mail servers such as www4mail is still a reality from remote areas of the world, and most likely will remain so, as the number of Internet users is expected to double by the year 2005. |
CIO April 15, 2004 Eric Knorr |
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets |
Salon.com May 7, 2001 Scott Rosenberg |
Defending the cookie monster There are lots worse things in the world than Web sites leaving cookies on your computer... |
PC Magazine November 2, 2005 Matthew D. Sarrel |
Cookies and PIE You know to be wary of cookies. Could persistent indentification elements be a bigger threat? |
PC Magazine September 2, 2003 Warren Ernst |
Making Cookies Despite their bad press, cookies are a good way to personalize a visitor's experience at your site. We show you how to start using them. |
InternetNews January 30, 2004 Ryan Naraine |
IE Patch Could Disrupt E-Commerce A planned fix for URL spoofing browser flaws could return error messages on Web sites that use clear text to authenticate user names and passwords. |
InternetNews January 29, 2004 Ryan Naraine |
Microsoft to Strike IE URL Passwords The browser will be modified to fix a known URL-spoofing flaw used by Web scammers. |
PC World April 2003 Scott Spanbauer |
Internet Tips: Protect Your PC and Data With the Security Checklist Follow these essential steps for your PC security. |
PC Magazine September 14, 2011 Samara Lynn |
Hands On: Windows Server 8 Microsoft is calling Windows Server 8 a "game-changer." They might be right. |
PC Magazine March 16, 2004 Leon Erlanger |
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. |
InternetNews March 20, 2008 Sean Michael Kerner |
Can We Fix The Web? The problem with the modern Web is that it's insecure and fixes may be a long time coming. |
PC World May 2001 Brad Grimes |
Privacy Matters Marketers would love to find out all about you and your online activities. But what personal data should you let them obtain? We report on recent developments in Net surveillance and their effect on you... |
InternetNews September 15, 2004 Ryan Naraine |
Critical Flaws Flagged in Mozilla, Thunderbird The vulnerabilities could enable malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. |
InternetNews August 5, 2004 Ryan Naraine |
Critical Flaws Spoil Opera Tune Opera updates its flagship browser to plug a series of potentially serious security holes. |
PC World April 20, 2001 Scott Spanbauer |
Mend Your E-Mail's Broken Links Mend broken links in e-mail, unmask disguised Web page advertising, check browser security settings, catalog your MP3s... |
InternetNews April 13, 2004 Sharon Gaudin |
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. |
InternetNews March 9, 2010 |
Blue Coat Backing Armored Browser Networking and security firm offers commercial support for Quaresso, a startup offering a new spin on the armored browser with remote support to shore up the last mile. |
PC World November 2001 Scott Spanbauer |
Internet Tips: Free Tool Nabs Web Bugs Stalk and block clear-GIF Web bugs, use IE's P3P to crumble cookies, e-mail long URLs with ease... |
PC World September 2004 Stan Miastkowski |
Cut the Clutter and Add Power to Your Browser Web browsers can use substantial amounts of computer resources, and their temporary files can hog huge amounts of disk space. Updates, add-ons, housekeeping--and even using an alternative browser--can improve your surfing experience. |
PC World August 2002 Scott Spanbauer |
Internet Tips: Listen to a World of Radio Stations on the Internet Don't limit your choice of media players or music... How to manage cookies with various browsers... |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews June 25, 2004 Ryan Naraine |
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. |
PC World March 18, 2001 |
Top 5 Cookie Managers Block cookie files, or choose to accept them, before they reach your hard drive. |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |