Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Input validation



  An Object is not a Hash

Following my article A String is not an Error, I want to bring attention to an issue that similarly applies to JavaScript in general, but has special relevance in the Node.JS environment. The problem boils down to the usage of {} as a data-structure where the keys are supplied by untrusted user input, and the mechanisms that are normally used to assert whether a key exists. Consider the example of a simple blog created with Express. We decide to store blog posts in memory in a {}, indexed ...

   Object,Hash,Node.js,JavaScript     2012-01-19 10:16:10

  11 Important Database designing rules

Introduction Before you start reading this article let me confirm that I am not a guru in database designing. The below 11 points which are listed are points which I have learnt via projects, my own experiences and my own reading. I personally think it has helped me a lot when it comes to DB designing. Any criticism welcome. The reason why I am writing a full blown article is, when developers sit for designing a database they tend to follow the three normal forms like a silver bullet. They...

   Database design,Rules,OLAP     2012-04-12 05:51:38

  PaaS vs. SaaS: The Differences And How To Pick The Right Option

Platform as a service (PaaS) and software as a service (SaaS) are two kinds of cloud computing products that enable businesses and their clients to deliver and use various services, respectively. Before diving into the differences between the two concepts, it’s important to take a step back and understand what a cloud service really is. Cloud computing primarily refers to large storage of data, programs, and operations that are accessible via the Internet and are not stored on a user&rsquo...

   CLOUD,PAAS,SAAS     2020-04-06 06:30:32

  Using public key authentication in SSH

SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc.  To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...

   LINUX,DEBUG,SSH,PUBLIC KEY     2016-09-10 05:55:46

  Different types of keystore in Java -- PKCS12

PKCS12 is an active file format for storing cryptography objects as a single file. It can be used to store secret key, private key and certificate.It is a standardized format published by RSA Laboratories which means it can be used not only in Java but also in other libraries in C, C++ or C# etc. This file format is frequently used to import and export entries from or to other keystore types. Next we will explain the operations which can be performed on PKCS12 keystore. Create PKCS12 keystore Be...

   Java, PKCS12, keystore, tutorial     2015-01-04 21:08:49

  Square bracket in checkbox name

0down votefavorite i have a form with checkboxes like this:    <input type=\"checkbox\" name=\"type[]\" value=\"1\" />Fast Food<br>    <input type=\"checkbox\" name=\"type[]\" value=\"2\" />Table Service<br>    <input type=\"checkbox\" name=\"type[]\" value=\"3\" />Cafeteria<br> when i use the brackets in the name (type[]), my php works:    $type=$_POST[\'type\'];    echo \"types are:\";for ( $counter...

   Square bracket,PHP,JavaScript,Array of n     2011-03-22 10:32:40

  Tips, Tricks and Tools You Will Need to Start Using HTML5 Today

IntroductionHTML5 has been a really hot topic in web development. With the support of most modern browsers available (Safari, chrome, firefox, IE10 and mobile devices), even though the specification has not fully completed yet, but many people have already adopted it as the main technology for all the web development projects. Online giant websites such as Google, facebook, twitter and youtube, they are all built in HTML5!For me, the most exciting features of HTML5 are the canvas and the robust ...

   HTML5,Web development,Tools,Tricks,Tips     2011-10-10 05:28:53

  The Evolution of a Programmer

High School/Jr.High 10 PRINT "HELLO WORLD" 20 END First year in College program Hello(input, output) begin writeln('Hello World') end. Senior year in College (defun hello (print (cons 'Hello (list 'World)))) New professional #include <stdio.h> void main(void) { char *message[] = {"Hello ", "World"}; int i; for(i = 0; i < 2; ++i) printf("%s", message[i]); printf("\n"); } Seasoned professional #include <iostream....

   Humour,Evolution,Programmer     2012-04-23 06:30:33

  Writing forward-compatible websites

This is a list of best practices for creating websites that do not break when browsers are updated. It's not always possible to follow all of these, but following as many of them as possible will help future-proof your website. This is especially important for intranet applications and other non-public websites where problems are likely to not be noticed during testing by browser vendors.JavaScriptPrefix all global variable access in onfoo attributes with “window.”When an e...

   Web design,Forward compatible,CSS,JavaScript,window     2011-11-23 08:07:35

  Getting started with C++ TR1 regular expressions

Overview This article is written for the benefit of someone familiar with regular expressions but not with the use of regular expressions in C++ via the TR1 (C++ Standards Committee Technical Report 1) extensions. Comparisons will be made with Perl for those familiar with Perl, though no knowledge of Perl is required. The focus is not on the syntax of regular expressions per se but rather how to use regular expressions to search for patterns and make replacements. Support for TR1 ext...

   Regular expression,Replace,TR1,Extension     2011-08-14 07:25:20