Tuesday, February 25, 2020

Developing an interactive secure website Research Paper

Developing an interactive secure website - Research Paper Example The extensive growth and use of the internet over the years have created and led to websites and web applications facing more threats and vulnerabilities each day. This has thus demonstrates the importance and emphasis developers and website administrators have put on web security. Web security does not only entail securing the web application only but also securing the web server and the web users as well. This article aims at explicating the various forms of threats, attacks and vulnerabilities that web applications, servers and users face.It will also show various methods of howto prevent, minimize and deal with security loopholes that attackers exploit. The importance of ensuring security of websites, web servers and the users cannot be underestimated (Braithwaite, 2002). Discussion There are various vulnerabilities that web applications and websites face. These threats range from security loopholes that are created during development, at the servers and at the user interfaces. T his discussion will mostly focus on the security of website application developed using PHP language and are SQL database driven. PHP functions Security Developing website applications using PHP is relatively easy since its syntax and semantics can easily and quickly be grasped. The buck though doesn’t stop here. It has the capability of performing diverse functions when its seamlessly and flawlessly working with HTML. The fact that it is open source and also works well with other open source tools and languages such as the MySQL database ad the Apache Server makes the most preferred web development languages for developers and very much targeted by hackers and malicious web users. Many developers, especially beginners ignore or forget the aspect of security (Shaw, 2001). It is worth noting here that even advanced developers sometimes write code that is vulnerable to attacks.PHP can work even if there are security loopholes in the coding. These loopholes are not hard to locat e in PHP and are what malicious web users look for. Although PHP offers some great features that can be used to minimize security vulnerabilities, it’s up to the developer to be able to utilize them (Braithwaite, 2002). Securing PHP applications entails limiting coding errors as much as possible. Common types of PHP security loopholes are: Error Reporting This is a PHP tool that allows diagnosis of errors and quick and easier fixing. It is also potential security vulnerability when no properly used such as when errors are publicly visible to users on-screen. It reveals a lot of information such as security loopholes in the code. Display_errors should be turned off or be appended a ‘0’ value so that errors cannot be viewed on-screen by users. If the Display_error is turned on or appended the ‘1’ value, errors will be displayed onscreen to users thus posing as a security threat that hackers can exploit. You can however opt to report errors by enabling log_errors. This is done by turning on log_errors and showing the location of the log using error_log. Register_Globals Writing PHP applications is made convenient and simpler by the use of Register_Globals. This although poses a great threat in terms of security. Register_Globals should therefore be always turned off. If turned on, users who are neither authenticated nor verified can inject variables in the application thus gaining administrative access to the application. A good example is where a user may append the value ‘?admin =1’ at the end of a page url and gain access to the sites administrative areas that might require a secure password. e.g. if(isset($_POST[‘pwd’]) && $_POST[‘pwd’] == â€Å"wxyz†) { $admin = TRUE; } If Register_Global is turned off, this kind of forced access cannot occur. Therefore, it is advisable to consider using predefined PHP variables such as $_POST, $_ENV, $_COOKIE, $_SERVER or $_GET to ensure tight se curity. Cross-Site Scripting (XSS) Hackers use this method to collect website’

Sunday, February 9, 2020

Analysis Of The Gift Of The Magi Essay Example | Topics and Well Written Essays - 4500 words

Analysis Of The Gift Of The Magi - Essay Example And lastly, the ending is satisfying but has failed to uplift the interest of its readers. JOURNAL ENTRY 14. AMERICAN HISTORY Like the short story â€Å"American History,† Toni Cade Bambara’s â€Å"Blues Ain’t No Mockin’ Bird† also details how its setting is essential in establishing the plot and the time frame of the story. Based on their manner of speaking, the setting may be estimated during the1950s to 60s or maybe just prior to the popularity and rise of Martin Luther King – due to the existence of a camera. A place off the countryside, some of the characters mentioned that this event took place in a county. And since there are children involved in the story, it had also probably occurred during summer or school break – where kids can enjoy the warm sun and the greenery outside their lawn. JOURNAL ENTRY 15. AMERICAN HISTORY Door of Hope for the United States Inside the door of hope for the United States are flashes of the colors b lue, white, and red – or the colors of the national flag. The color red symbolizes traumatic yet significant events like the assassination of President John F. Kennedy, the fall of the World Trade Center, and the like. Like Elena, I would continue to hope for such inevitable events that would make this country stronger, united, and hopeful that everything that happens is for the betterment of the country. The color blue symbolizes peace, serenity – that is above everything bad that is happening in the country peace will still outshine in the hearts and minds of every American hoping for a better future. And the color white symbolizes purity, cleanliness, and innocence. Despite the unending destructive events in the country, I am still hopeful that this country will be able to bring out a just, humane, and decent society, who only hopes for the betterment of the country and not the betterment of the elite few. Door The door open for Me Like Elena, I only hope that the E l Building will remain only a setting of the past and the present. Whatever the future may bring, and the course of outcome of Kennedy’s assassination and other significant events, I only hope that El Building will only be a bridge that will take me towards my dreams and aspirations towards a better life outside this suburban community. And through the El Building, and its significant lessons that has taught me, I may be able to explore the world full of hope, dream, and pride. Door of Hope for the World For the third door of hope, I would hope that the world would continue to be as blue and green as it has always been, with hardly the shades of gray, black, and red. The vast water bodies, bolstering with pride at its cool sea breeze. The green mountains and landforms, signifying the healthy state of nature – as it conquers shades of gray, black, and red or the colors of destruction, famine, and war. JOURNAL ENTRY 16. HELEN ON EIGHTY-SIXTH STREET Vita, the main charact er on Helen on Eighty-Sixth Street: Physical Attributes Vita struck me as a nerd. A girl who studies so hard that she already memorized the story of Helen of Troy and the Trojan War word for word, cover to cover. Although not explicitly mentioned, Vita may be less than physically attractive than Helen. This may have been the basis why Mr, Dodd initially chose Vita to be in the Trojan Horse. Emotional Attributes Because of the absence of her father, Vita is somehow longing for security that only a father could provide.