Anatomy of a SQL Injection Attack

Wednesday, October 8th, 2008

While there are a number of security risks in the world of electronic commerce, SQL injection is one of the most common Web site attack techniques used to steal customer data such as credit card numbers, hold customer data hostage by encrypting it or destroy data outright. Where a Web server ...

Web Form Spam Alive and Kicking

Thursday, July 24th, 2008

Spammers have never balked at using Web forms as a way of sending out spam messages–anything to expose their wares. Basically they will look for a public Web server that allows them to provide feedback or information to a certain company. These Web forms require them to fill up certain ...

Live Mesh Connects Folders and Desktops Across Windows PCs

Thursday, July 17th, 2008

Windows only (for the moment): Microsoft has thrown open the doors to a "tech preview" of its Live Mesh service, a kind of web-boosted version of Lifehacker favorite folder-syncing tool FolderShare, with a bit of remote desktop connection thrown in. Signing up with a Windows Live ID gets you 5 ...

Mozilla Patch Plugs a Safari Hole

Wednesday, July 16th, 2008

Mozilla Corp. has patched a pair of critical vulnerabilities in Firefox, taking the unusual step of updating the older version 2.0 on Tuesday but delaying the fixes for the newer version 3.0 until Wednesday. Both updates, labeled Firefox 2.0.0.16 and Firefox 3.0.1, plug two holes rated "critical" by Mozilla, which uses ...

Access Everywhere: The Definitive Guide to Wi-Fi

Wednesday, July 16th, 2008

For the last decade, as wireless networks have grown in popularity, so has the number of hot spots around the globe. The leading online hot-spot directory, JiWire, lists 215,666 locations as of this writing. Those are just the ones people bother to report. Believe it or not, they're not all in ...