Security and Usability
In general, security and usability often come into conflict with one another. After all, security is designed to make things tougher for the bad guys and usually some of this spills over onto regular,...
View ArticleOpenID pros and cons
When I first heard of the OpenID concept back in 2006 it seemed like a novel idea that would go well with the increasing prevalence of web services and applications. Most of these services require...
View ArticleProtecting SVN metadata folders on a web server
I recently changed my WordPress install over to an SVN checkout in order to get rid of the tedious steps required to upgrade every time a new version is released. Thankfully, following the well-written...
View ArticleUsing the Basic Constraints extension in X.509 v3 certificates for...
It’s not often that you’ll be creating your own X.509 certificates for a web server, since any certificates that you create (self-signed or signed by your own CA) will not be trusted by most browsers...
View ArticleHow the Twitter StalkDaily Worm spread so fast
If you use Twitter a lot (unlike me) you’ll likely have been alerted and worried about the presence of a worm that’s been making the rounds at the popular micro-blogging website. The so-called...
View ArticleUsing cURL in PHP to access HTTPS (SSL/TLS) protected sites
From PHP, you can access the useful cURL Library (libcurl) to make requests to URLs using a variety of protocols such as HTTP, FTP, LDAP and even Gopher. (If you’ve spent time on the *nix command...
View Article
More Pages to Explore .....