Having been stressing online forms of my fellow developers at work, and reading Eric Farraro’s posts on Cross Site Scripting and his recent Google exploit, I figured just how important user input validation is, and the need to emphasise that.
Both XSS and SQL Injections are simple exploits that work on a basic assumption that a [...]
Anyone remember how Sony pulled that rootkit stunt a year ago? The events have stired up some buzz around security and tech communities, but seemed to have quickly died out for the general public.
DRM – Digital Rights Management, is a type of technology that claims to protect against piracy of copyrighted content, but instead (and [...]
The Independent Study Unit (ISU or ISP in some schools) usually involves an independent programming project at the end of the year, to demonstrate what students have learned. More often than not, it turns out to be a troublesome excercise as advanced students try to show off and over-complicate their assignment, while others are having [...]