Martin E. Psinas is a self-taught web developer, published author, and is currently studying Japanese. For more information, visit his website.
Creating a Mobile Photo Blog, Part 1
The convenience of being able to access the Internet from anywhere at any time has made sharing messages and pictures very popular. This is the first article in a two-part series in which you’ll learn how to create a photo blog as part of your personal website which you can update from your mobile phone simply by sending an email.
PHPMaster: Preventing Cross-Site Request Forgeries
Cross-site request forgery (CSRF) is a common and serious exploit where a user is tricked into performing an action he didn’t explicitly intend to do. This can happen when, for example, the user is logged in to one of his favorite websites and proceeds to click a seemingly harmless link. In the background, his profile information is silently updated with an attacker’s e-mail address. The attacker can then use the website’s password reset feature to e-mail herself a new password and she’s just successfully stolen the account.
Preventing Cross-Site Request Forgeries (CSRF)
CSRF is a serious exploit where a user is tricked into performing an action he didn’t explicitly intend to do. Learn exactly how CSRF attacks work and what you can do to protect yourself and your users because, as the old saying goes, “an ounce of prevention is worth a pound of cure.”
PHPMaster: Monitoring File Integrity
Ask yourself how you might address the following circumstances when managing a website: A file is unintentionally added, modified or deleted A file is maliciously added, modified or deleted A file becomes corrupted More importantly, would you even know if one of these circumstances occurred? If your answer is no, then keep reading. In this guide I will demonstrate how to create a profile of your file structure which can be used to monitor the integrity of your files. The best way to determine whether or not a file has been altered is to hash its contents.
Monitoring File Integrity
How would you know if something is modified or deleted from your website, be it either maliciously or unintentionally? This article teaches you how to create a profile of your site’s file structure using hashes which then can be used to monitor the site’s integrity.