Black Box Penetration Tests
by Ben Sgro
This article will highlight some techniques used by penetration testers and malicious attackers. By better understanding adversaries, developers can work to construct more robust and secure software.
Vol 8, Issue 4
March 2009
by Ben Sgro
This article will highlight some techniques used by penetration testers and malicious attackers. By better understanding adversaries, developers can work to construct more robust and secure software.
by Hans Zaunere
This article reviews the security ecosystems of the web in general and then dives into those specific to PHP. It will look at the different places the responsibility of security falls, and fundamental best practices from the trenches to help ensure your LAMP/WAMP deployment isn't caught off guard. Along the way, we'll debunk myths and reveal some surprising facts that could leave you thinking PHP is one of the most secure languages available today.
by Barry Austin
Who would say such a thing? Obviously, we can't let that stand. It's time to bust some myths while raising our own game to the next level.
by Richard Bates
You've probably noticed that many companies creating rich Internet applications (RIAs) use the terms Flex and Java almost interchangeably. It's a commonly held belief that only Java technology can deliver the features needed to run a serious RIA. But those of us who work with PHP every day know that it can compete with Java in almost any market and even best it in a few major areas.
by Jakub Vrána
Storing text in multiple languages can be a hassle. Learn the pros and cons of three different ways to handle this with MySQL.
by Derick Rethans
Ever wondered about the inner workings of PHP? Derick walks us through how PHP handles variables and how PHP's new garbage collection process will save your memory.
by Arne Blankerts
Validating input should be a no-brainer, but so many developers skimp on this. Arne gives some quick and easy solutions to your input validation needs.
by Ben Ramsey
Ever wanted to link up two accounts on separate websites (Twitter, Facebook, LinkedIn, etc.), but you didn't want to give out your username and password? OAuth could be the answer you've been looking for.
by Helgi Þormar Þorbjörnsson
Backwards compatibility can be a dirty word for customers looking for APIs and libraries to use, and it's an even dirtier word to the developers of those APIs and libraries, but backwards compatibility is essential for all, and here's why.
by Ivo Jansch
Estimations are one of the most difficult parts of a project. These simple tips will help you to refine your estimation process and stick to your deadlines.
by Marco Tabini
Walt Disney World may seem like a vacation destination, but Marco is constantly learning.
Collaborating with industry leaders to bring you the best PHP resources and expertise
Interested in partnering? Get in touch →