GentleGiant has written 87 Article(s). Page Num: 1
Anonymous Email How Why Where Email encryption will protect you from hackers, but it does nothing for your anonymity. Email... Posted on: 01/06/23 at 04:00:57 EST
When Staying Home Pays You Better Than Working $600 per week. That’s what the federal government is now offering to people who’ve lost their jobs... Posted on: 05/27/20 at 00:23:12 EST
Google Search Tricks Millions of people use Google search every day for a variety of reasons. Students use it for... Posted on: 05/24/20 at 15:44:31 EST
How to get rid of the METRO UI How to get rid of the annoying windows 8 metro tiled screen that all desktop users and come to hate... Posted on: 01/05/13 at 11:18:42 EST
Perl CGI script to validate your HTML forms. Here is a basic Perl script using CGI to check and see if the required fields are there, and if... Posted on: 07/14/12 at 10:27:00 EST
JavaScript for Validating a Form In the head portion of your HTML, you should create a script to do the form validation: 1.Set up... Posted on: 07/14/12 at 10:26:56 EST
JavaScript Objects The idea of object-oriented programming is not a new one. It actually dates back over 30 years, and... Posted on: 07/01/12 at 08:23:43 EST
The Language of Javascript There are many, many different computer programming languages in use today. Each has its own set of... Posted on: 06/29/12 at 14:07:18 EST
Using the break Statement in Javascript There is a third way for a while loop to terminate. If the special statement break is encountered... Posted on: 06/29/12 at 14:07:11 EST
The Perils of Infinite Loops Listing 2.4 A while Loop with an Internal break Statement var x = 1; var xoddsum = 0; var xtmp = 0;... Posted on: 06/29/12 at 14:07:01 EST
Javascript - Using the continue Statement There is another special statement that may be used inside while loops: the continue statement. The... Posted on: 06/29/12 at 14:06:53 EST
Javascript - Functions and Objects The basic statements, expressions, and operators that were discussed at the beginning of this... Posted on: 06/29/12 at 14:06:43 EST
Form Based Authentication For Websites As a rule, CAPTCHAs should be a last resort. They tend to be annoying, often aren't... Posted on: 01/29/12 at 14:03:47 EST
Hints for Web client authentication Use cryptography appropriately Use of cryptography is critical to providing authentication.... Posted on: 01/29/12 at 14:03:42 EST
Using Cookies in CGI HTTP protocol is a stateless protocol. But for a commercial website it is required to maintain... Posted on: 01/24/12 at 14:54:22 EST
Cross-site scripting (XSS) A cross-site scripting (XSS) hole is when an attacker can inject scripts into a page sent by your... Posted on: 01/24/12 at 14:54:17 EST
Avoiding XSS holes "Open redirect" scripts should not redirect to URLs with special protocols that... Posted on: 01/24/12 at 14:54:14 EST
Avoiding XSS holes in sites that allow HTML For sites where users are allowed to use HTML, the goal is not to escape the input, but to restrict... Posted on: 01/24/12 at 14:54:12 EST