Archive for the ‘Security’ Category

Elements of cryptography: The symmetrical cryptography

In the previous article we saw a particular case of the cryptographyapplication, that is hashing. We saw  how useful it is in coding passwords or to assure us the validity of a downloaded file. But this technique isn’t applicable when one needs to codify a message that somebody else will read since hashing is not reversible. || Read more »

Elements of cryptography: Hashing algorithms

Elements of cryptography: Hashing algorithms

Don't be scared, keep reading! I decided to start the article in this way since reading on the same title words such as cryptography and hashing algorithms can be intimidating. My aim, in this series of articles dedicated to cryptography,...

2 comments

Security and web sites: how to find the causes of code injection attacks, validation techniques

Security and web sites: how to find the causes of code injection attacks, validation techniques

So, after a thorough analysis of a web site's performance, we've found out how vulnerable it is, and in how many ways it is so.  We talked about code injection attacks, and considered the causes of this type of vulnerability,...

1 comment

Security and Web sites: Code Injection

Security and Web sites: Code Injection

After talking about safety on the web in general, and having observed the enormous complexity behind the simple navigation of a website, you'll realize it's impossible to guarantee total security. But as web sites developers we can do much, starting with...

5 comments

Security and Web sites: What lies behind your site?

Security and Web sites: What lies behind your site?

When you can really be sure of having published a great site? When your casual  navigator is able to use it without reading instructions, tips and guides, in a natural way, focusing on content rather than on mechanical user interface. Simplicity is...

2 comments