www.webdeveloper.com

Search:

Type: Posts; User: jeffmott

Page 1 of 20 1 2 3 4

Search: Search took 0.04 seconds.

  1. Replies
    41
    Views
    5,317

    Actually though, I could use some of Charles'...

    Actually though, I could use some of Charles' help on the make-user document, since he is far more familiar with the DOM than I. MSIE treats it quite peculiar. If I give both textboxes and spans the...
  2. Replies
    41
    Views
    5,317

    ummm, you did read my post right?

    ummm, you did read my post right?
  3. Replies
    41
    Views
    5,317

    A half hour, especially when much of that time...

    A half hour, especially when much of that time was wasted just trying to figure out what it was you wanted him to retrieve, is not considered high security by any means.

    Also, I have visited your...
  4. Thread: Cookies!

    by jeffmott
    Replies
    4
    Views
    1,078

    Cookies would not be good for what you speak of....

    Cookies would not be good for what you speak of. For example, you're looking for them to store money (winnings?) from a casino? What if they moved to a different computer or cleared their internet...
  5. Thread: Center tags

    by jeffmott
    Replies
    2
    Views
    821

    Except the align attribute is also deprecated and...

    Except the align attribute is also deprecated and defeats the purpose of not using the center element. If an element does not change the actual content or define the structure of the page then it is...
  6. Replies
    41
    Views
    5,317

    This is actually weaker than the usual insecure...

    This is actually weaker than the usual insecure JavaScript, and is extremely easy to restore to its original form. :\

    brendandonhue's suggestion is really your only option to be effective.
  7. Neither can I. That is why I used the word...

    Neither can I. That is why I used the word mistakingly.It's situations like this where Perl comes in very handy to have on your local system. You can get a Win32 version from ActiveState.
    # rename...
  8. .Z is an extension for a UNIX Compressed Archive...

    .Z is an extension for a UNIX Compressed Archive File. It's possible Netscape is mistakingly attempting to interpret and uncompress a file with this in its name.

    ...Just a guess.
  9. Replies
    6
    Views
    1,480

    In Opera and IE it renders with the text being a...

    In Opera and IE it renders with the text being a shade of blue ( rgb(0,101,156) ) and the background a shade of grey ( rgb(238,238,238) ). Netscape (Mozilla) does not render it this way, though. And,...
  10. Thread: w3 validator

    by jeffmott
    Replies
    1
    Views
    1,255

    You will find the link in the left column of...

    You will find the link in the left column of http://www.w3.org/
  11. Replies
    14
    Views
    1,713

    If you have never written a CGI program then you...

    If you have never written a CGI program then you really have only two choices:
    1) learn ;)
    2) download a pre-written one.

    If you want to learn then you'll first have to choose a language (CGI...
  12. The JS protection scheme I posted doesn't.And in...

    The JS protection scheme I posted doesn't.And in every other protection scheme all one has to know is the password by someone leaking it or something they can guess and boom they are in. Does this...
  13. You don't. :) Obviously JavaScript cannot...

    You don't. :)

    Obviously JavaScript cannot fully replace the capabilities of a server-side method. But it can protect a page/section. The idea here is that the security relies on the secrecy of...
  14. You missed my point, which was it isn't. But if...

    You missed my point, which was it isn't. But if you're so sure then feel free to show us how useless it is.
    http://jmott.hypermart.net/js-protected/
  15. Replies
    24
    Views
    2,885

    I personally feel CGI is still the best way to...

    I personally feel CGI is still the best way to go. You are not restricted to any one language. If your program requirs ease to maintian and modify, you can choose to write your programs in Perl. If...
  16. Replies
    24
    Views
    2,885

    The fact is that there may be some bias with both...

    The fact is that there may be some bias with both statistic results. Apache, being a free server, will probably used by all those "little guys" and netstat registers each one equally. port80's bias...
  17. This would actually add insecurity. I'm assuming...

    This would actually add insecurity. I'm assuming your idea is to set a cookie given a correct password then all restricted pages check for the cookie's existence? But what if scripting was disabled...
  18. Replies
    6
    Views
    1,038

    easier still... req.innerHTML = "

    easier still...
    req.innerHTML = "<table border='0' cellpadding='0' cellspacing='0' style='border-collapse: collapse' width='650'>\
    <tr>\
    <td>hello</td>\
    </tr>\
    </table>";
  19. Replies
    24
    Views
    2,885

    They don't actually rule the Web server world,...

    They don't actually rule the Web server world, however. Apache (and thus PHP) is the software loaded onto more servers than all other server software combined.

    [Edit] http://news.netcraft.com/
  20. View Post

  21. Replies
    17
    Views
    69,365

    No. There's no reason you should ever have to...

    No. There's no reason you should ever have to type a section of code more than once. In fact, making sure it is in only one location makes the program easier to maintain.
  22. Replies
    18
    Views
    1,970

    If there is a syntax error somewhere in the...

    If there is a syntax error somewhere in the script, browsers will not be able to execute any code that is within the same SCRIPT element that the error occured. If you used the prompt statement by...
  23. This is actually just another classic insecure...

    This is actually just another classic insecure script. The developer, who is obviously far from being a cryptologist, attempted to write their own hashing function. And the result if far from secure....
  24. This is a generalization. And, considering the...

    This is a generalization. And, considering the number of insecure JavaScripts floating around out there, it is generally true. But, a page secured by JavaScript is possible.
  25. You missed the point of encryption. All they see...

    You missed the point of encryption. All they see in the source in the encrypted string. They cannot retrieve a string that will generate the same hash (assuming a secure algorithm is used, such as...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4
HTML5 Development Center



Recent Articles