Public speaking can be enormously empowering and fulfilling. I have spoken at quite a few international conferences - I always…
In a previous blog post where I covered Cross-Site Request Forgery and what potential impacts and consequences such an attack…
Your friend creates a website. You are curious and you ask him: "is it secure?", which, in your mind, probably…
How does a server know when a new header begins and the old one ends or when a line is…
Another day, another web application gets hacked. Most of the time web application hacks fly under the radar and are discovered…
Attacks on today's web are an unsurprising reality - websites are hacked daily, data is being stolen and leaked left,…
When developing a web application, web developers sometimes need to first turn data into a proper format so that it…
We have all seen search forms, haven't we? Take a look at mine: The above search form is pretty basic…
Web applications can be susceptible to all sorts of vulnerabilities: a web application can be vulnerable to at least one…
Let's take a scenario like so: I have a web application that allows people to buy software I created -…