Similar Articles |
|
New Architect April 2002 Al Williams |
A Cookie by Any Other Name Is it safe to use cookies again? |
PC World September 26, 2007 Lincoln Spector |
Identify Tracking Cookies in Firefox Find out what entity is responsible for each cookie you accumulate while surfing the Net. |
PC World March 26, 2001 Dennis O'Reilly |
Three Tools That Make Cookies More Palatable Some Internet cookies are helpful, some are harmful. These three tools help you distinguish friend from foe... |
PC World May 2002 Andrew Brandt |
New Tools Take the Bite Out of Cookies Two cookie managers quietly do your bidding... |
PC World March 18, 2001 |
Top 5 Cookie Managers Block cookie files, or choose to accept them, before they reach your hard drive. |
JavaWorld January 2001 Thomas E. Davis & Craig Walker |
Take control of the servlet environment, Part 3 Browser cookies are wolves in sheep's clothing. Developers use these incredibly simple and useful mechanisms to create Web-based applications that rely on the persistence of sessions. However, cookies feature an odd little problem in relation to subdomains... |
Linux Journal May 2000 John Holland |
An Introduction to PHP3 If you are designing a new web site, this language can provide just the help you need. |
Linux Journal October 1, 2002 Nuno Loureiro |
Programming PHP with Security in Mind Writing code that prevents some common types of attacks is rather easy -- here are some guidelines. |
PC World April 2006 Scott Spanbauer |
Take Charge of What Web Sites Know About You Control cookies, clear your download history, and take other steps to keep snoops off your online trail. |
JavaWorld April 2002 Michael Juntao Yuan & Ju Long |
Track wireless sessions with J2ME/MIDP Every e-commerce application must support session tracking. Unfortunately, MIDP, a J2ME technology, supports only the standard HTTP protocol, which is stateless. This article explores ways to add session support into the current MIDP network API framework... |
InternetNews May 5, 2006 Andy Patrizio |
Microsoft Awarded 'Super Cookie' Patent The patent for a so-called "super cookie," may have come so long after Microsoft's application that it's been superceded by newer technologies. |
PC World November 2000 Steve Bass |
Fight for Your Online Privacy Software to protect against bad cookies and people trying to hack into your computer. |
JavaWorld April 2002 Sonal Bansal |
A recipe for cookie management Client-side HTTP state management is important for creating Java applications that need to interact with Web applications like browser-based email or online banking services. This article presents a cookie library for robust and easy client-side HTTP state management in Java... |
PC Magazine November 2, 2005 Matthew D. Sarrel |
Cookies and PIE You know to be wary of cookies. Could persistent indentification elements be a bigger threat? |
Salon.com May 7, 2001 Scott Rosenberg |
Defending the cookie monster There are lots worse things in the world than Web sites leaving cookies on your computer... |
PC World March 1, 2002 Joris Evers |
PHP Security Flaws Widespread on the Web Scripting language could leave as many as 1 million Web sites vulnerable to attack, researcher says... |
Linux Journal February 1, 2007 Irfan Habib |
Integrating PHP and Perl PHP and Perl are both so powerful, they can even run each other. |
The Family Room |
Cookie Baking, Decorating, Storing & Shipping Tips Plain, sturdy cookies, such as drop cookies like Chocolate Chip or Oatmeal Raisin, make the best travelers... |
InternetNews March 19, 2004 Ryan Naraine |
Got Web Services With PHP? The open source programming language gets a makeover with built-in support for Web Services interoperability. |
Linux Journal August 2000 Reuven M. Lerner |
At the Forge Session Management with Mason. This Perl-based web helper and MySQL work together to let you quickly build a user registration system for your web site. |
Seasoned Cooking October 2010 Ronda L. Carnicelli |
Will's Cookies Sometimes recipe ideas come from entertaining places. Like the mind of a six year old. |
PC World September 2004 Stan Miastkowski |
Cut the Clutter and Add Power to Your Browser Web browsers can use substantial amounts of computer resources, and their temporary files can hog huge amounts of disk space. Updates, add-ons, housekeeping--and even using an alternative browser--can improve your surfing experience. |
InternetNews July 31, 2009 |
U.S. Government Rethinking Web Visitor Tracking The federal government could to allow government Web sites to again place cookies on visitors' PCs, reversing a policy instituted in 2000 that forbade the practice on all federal Web sites. |
PC World November 9, 2001 Jennifer DiSabatino |
IE Hole Reveals Users' Cookie Data Microsoft is working on patch, but for now malicious sites could siphon information from IE 5.5 and 6.0... |
DailyCandy April 26, 2005 |
Fortune Cookies Buying these buttery-licious cookies will help American folk artists. |
DailyCandy January 31, 2005 |
Brain Food Each box of super-rich cookies by Feed Your Soul contains a message or proverb handpicked for various occasions. |
PC World June 1, 2000 Matt Lake |
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. |
InternetNews January 13, 2006 Sean Michael Kerner |
Latest PHPs Fix Flaws Users of PHP versions 4 and 5 are being advised to upgrade to the latest versions in order to protect against a number of security issues. |
The Motley Fool February 6, 2008 Nathan Alderman |
When Sesame Street Beats Wall Street There are lessons to be learned about the markets from Cookie Monster and Sesame Street. |
PC World January 2003 Scott Spanbauer |
Protect Yourself -- Clear Your Cookies and History Keep your Web browsing private... stream music with PeerCast... control ads in Mozilla. |
InternetNews July 14, 2004 Sean Michael Kerner |
XML-'Reloaded' PHP5 Released XML enhancements are among the new features in the latest version of PHP. |
New Architect July 2002 Elizabeth Fulghum |
Zend Studio 2.0 Development tools for PHP grow up. |
InternetNews February 1, 2008 Sean Michael Kerner |
PHP 4 is Dead--Long Live PHP 5 PHP 4 hits its end of life this year as developers push users to PHP 5. |
AskMen.com Bruce Willer |
How To: Surf The Web Anonymously Cookies, temporary files, surfing history, etc. |
InternetNews December 26, 2005 Sean Michael Kerner |
PHP: Three Versions, One Promise PHP, the open source challenger to .NET and Java, gears up for its best year yet. |
PC World April 9, 2001 Andrew Brandt |
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... |
InternetNews June 25, 2009 Sean Michael Kerner |
First Major PHP Update in Years Coming Soon The upcoming PHP 5.3 release is likely to be important for a number of reasons. |
InternetNews July 16, 2004 Ryan Naraine |
PHP Zaps Security Leaks The PHP Group patches a pair of potentially serious vulnerabilities in the popular open-source scripting language. |
CRM August 1, 2005 Alexandra DeFelice |
Helping Consumers to Swallow Cookies From cookie rejection to new legislation, marketers must clear more and more hurdles to capture customer information. Winning customer trust is key to gaining access to personal information. |
InternetNews December 21, 2007 Sean Gallagher |
With Google/DoubleClick Approved, is Privacy Dead? The Google-DoubleClick merger creates a uniquely large single lightning rod for privacy activists to get up in arms over. |
Search Engine Watch July 7, 2005 Chris Sherman |
Still More Cool Firefox Tools The Firefox development community has been busy developing a range of new tools that enhance your searching and browsing activities, and best of all, they're free. |
Search Engine Watch December 10, 2010 Marc Poirier |
Online Advertising: The End of Cookies? Regardless of how we track, it's what we do with the data that is the main issue. Privacy concerns aren't going away, so it's our responsibility as marketers to use the data we gather responsibly. |
Linux Journal May 1, 2007 Nicholas Petreley |
Ajax Simplified Ajax can become complex as far as implementation, but the concept is quite simple. Here are the key steps involved that exploit the power of Ajax. |
PC World August 2002 Scott Spanbauer |
Internet Tips: Listen to a World of Radio Stations on the Internet Don't limit your choice of media players or music... How to manage cookies with various browsers... |
Linux Journal April 2000 Nalneesh Gaur |
Assessing the Security of Your Web Applications An outline of key test areas to identify security issues in a web application and provide measures to minimize them. |
PC World April 2003 Scott Spanbauer |
Internet Tips: Protect Your PC and Data With the Security Checklist Follow these essential steps for your PC security. |
InternetNews March 28, 2006 Sean Michael Kerner |
Keeping PHP From Prying Eyes Currently in Beta testing, Zend Safeguard offers the promise of obfuscating source code as well as providing license management capabilities that aim to make PHP based application development and deployment more attractive to ISVs. |
InternetNews October 31, 2005 Sean Michael Kerner |
PHP Users at Risk? Multiple security vulnerabilities in PHP are patched in new release of PHP 4.4.1, though PHP 5.x users are still at risk. |
CRM August 2011 Leonard Klie |
New EU Regulations to Affect Email, Online Marketing Opt-in consent required for emails and for tracking the online activity of Web site visitors |
InternetNews April 1, 2005 Jim Wagner |
PHP Team Patches DoS Bugs Vulnerabilities in two functions of open source PHP versions 4 and 5 cause infinite loops leading to a system crash. |