tag Security

標籤
貢獻37
22
03:50 AM · Nov 17 ,2025

@Security / 博客 RSS 訂閱

Jessica Joseph - The Safest Way To Hide Your API Keys When Using React

Back in the day, developers had to write all sorts of custom code to get different applications to communicate with each other. But, these days, Application Programming Interfaces (APIs) make it so

react , API , Tools , Security , Apps

收藏 評論

Philip Tellis - Keeping Web Users Safe By Sanitizing Input Data

In my last article, I spoke about several common mistakes that show up in web applications. Of these, the one that causes the most trouble is insufficient input validation/sanitization. In this arti

php , Security , coding

收藏 評論

Nicolas Hoffmann - Content Security Policy, Your Future Best Friend

A long time ago, my personal website was attacked. I do not know how it happened, but it happened. Fortunately, the damage from the attack was quite minor: A piece of JavaScript was inserted at the

Tools , Security , coding

收藏 評論

Atila Fassina - Fine-Grained Access Handling And Data Management With Row-Level Security

Many apps have some kind of user-specific information or data that is supposed to be accessed by a certain group of users and not by others. With these sorts of requirements comes a demand for fine-

Security , Apps , Privacy

收藏 評論

Emerson Loustau - Free SSL For Any WordPress Website

If you have an e-commerce website, then SSL is mandatory for safely processing credit cards. But even if you aren’t processing payments, you should still seriously consider secure HTTP (or HTTPS), e

wordpress , Security , HTTPS

收藏 評論

Robert Bowen - What Is The Worst Design or Programming Mistake You’ve Ever Made?

Mistakes are made every day in the design and development world. It’s nothing to be ashamed of; it happens. In fact, mistakes are one of the most powerful learning tools at our disposal. Our mistake

Community , Errors , workflow , Security , Discussions , Opinion Column

收藏 評論

Philip Tellis - Common Security Mistakes in Web Applications

Web application developers today need to be skilled in a multitude of disciplines. It’s necessary to build an application that is user friendly, highly performant, accessible and secure, all while e

php , Security , coding

收藏 評論

Robin Marx - HTTP/3 From A To Z: Core Concepts

You may have read some blog posts or heard conference talks on this topic and think you know the answers. You’ve probably heard things like: “HTTP/3 is much faster than HTTP/2 when there is packet l

performance , Guides , Security , Browsers

收藏 評論

Robin Marx - HTTP/3: Performance Improvements (Part 2)

Welcome back to this series about the new HTTP/3 protocol. In part 1, we looked at why exactly we need HTTP/3 and the underlying QUIC protocol, and what their main new features are. In this second

performance , Guides , Security , Browsers

收藏 評論

Heather Burns - Legal Guidelines For The Use Of Location Data On The Web

Location-based services are growing in popularity every day, and beacon-based services are tipped to be the advertising goldmine of 2016. You may already be using location data and beacons to enhanc

Ethics , Security , Privacy , User Interaction

收藏 評論

Anders Johansson - How To Prevent WordPress SQL Injection Attacks

Did you know that your WordPress site could be a target for hackers right now? That’s right! Today, WordPress powers over 43% of all websites on the internet. That kind of public news makes WordPres

wordpress , Techniques , Frameworks , Security

收藏 評論

Zack Grossbart - P Vs. NP: The Assumption That Runs The Internet

Let’s get a few things out of the way first. This isn’t your regular Smashing Magazine article. It’s not a “how to“; it won’t show you how to build a better menu or improve your project tomorrow. Th

performance , Security , coding

收藏 評論

Neal Fennimore - Passkeys: A No-Frills Explainer On The Future Of Password-Less Authentication

Passkeys are a new way of authenticating applications and websites. Instead of having to remember a password, a third-party service provider (e.g., Google or Apple) generates and stores a cryptograp

Techniques , Tools , Security

收藏 評論

ZURB - Case-Study: Deconstructing Popular Websites

In our past articles, we’ve experimented with better ways to engage users on web pages with CSS3. We love getting into the nuts and bolts of web design by showing off some nifty coding tricks. In th

Security , Case Studies , Opinion Column , Design

收藏 評論

Anthony T - Why Passphrases Are More User-Friendly Than Passwords

A user’s account on a website is like a house. The password is the key, and logging in is like walking through the front door. When a user can’t remember their password, it’s like losing their keys.

Security , ux , User Interaction

收藏 評論

Leigh Mason - Taking Credit Card Payments Online: What’s Involved?

If you’re looking to integrate a credit card payment solution onto your website, the following steps are a guide to applying for, enabling and taking payments online. At first glance, the prospect o

Security , Web Design , E-Commerce , Payment , Business

收藏 評論

Zack Grossbart & Terry Yao - How To Protect Your App With A Threat Model Based On JSONDiff

Security changes constantly. There’s a never-ending barrage of new threats and things to worry about, and you can’t keep up with it all. It feels like every new feature creates expanding opportuniti

Tools , Security , Apps

收藏 評論

Daniel Pataki - How To Secure Your WordPress Website

This increase in naughty behavior, however, has spurred developers to write better code, and framework vendors have implemented many functions to help coders in their battle against the dark side.

wordpress , Security , Techniques (WP)

收藏 評論

Mathias Biilmann Christensen - How To Issue A New SSL Certificate With An Old SSL Key

There was obviously a lot of confusion about how HTTP Public Key Pinning (HPKP) worked. In the middle of the incredibly hectic process of running a major conference, it’s the last kind of issue anyb

ssl , Security

收藏 評論

Alex Frison - 10 Steps To Protect The Admin Area In WordPress

The administration area of a Web application is a favorite target of hackers and thus particularly well protected. The same goes for WordPress: when creating a blog, the system creates an administra

wordpress , Security

收藏 評論

Guy Podjarny - Eliminating Known Vulnerabilities With Snyk

The way we consume open source software (OSS) dramatically changed over the past decade or two. Flash back to the early 2000s, we mostly used large OSS projects from a small number of providers, suc

performance , Security , coding

收藏 評論

Caleb Olojo - Implementing A Reset Password Feature With Next.js Dynamic Routes

In a general sense, authentication poses itself as a roadblock to many people when they are trying to get started with a particular framework, and Next.js isn’t left behind. Although, there are lot

performance , Security , next.js , Javascript

收藏 評論

Anthony T - Better Password Masking For Sign-Up Forms

Masking passwords is an old practice that’s commonly implemented in sign-up and log-in forms. It’s used to prevent over-the-shoulder snoopers from catching the user’s password. While masking passwor

Security , ux , Usability

收藏 評論

Christian Heilmann - Web Security: Are You Part Of The Problem?

Website security is an interesting topic and should be high on the radar of anyone who has a Web presence under their control. Ineffective Web security leads to all of the things that make us hate t

php , Security , coding , Javascript

收藏 評論