28 Feb '14, 7pm

@josh_hepworth has_secure_password and filtering: don't build them yourself.

The threats against web applications include user account hijacking, bypass of access control, reading or modifying sensitive data, or presenting fraudulent content. Or an attacker might be able to install a Trojan horse program or unsolicited e-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources. In order to prevent attacks, minimize their impact and remove points of attack, first of all, you have to fully understand the attack methods in order to find the correct countermeasures. That is what this guide aims at.

Full article: http://guides.rubyonrails.org/security.html#user-management

Tweets

@josh_hepworth has_secure_password and filterin...

guides.rubyonrails.org 28 Feb '14, 7pm

class ClientsController < ApplicationController # This action uses query string parameters because it gets run # by an HTT...

Believe it! How to Build Green At No Added Cost

buildinggreen.com 01 Mar '14, 6am

How to Build Green At No Added Cost Reduced operational costs, improved occupant health and productivity, and buildings wi...

This is a terrible idea. Lawmakers Call for New...

dodbuzz.com 27 Feb '14, 7pm

Lawmakers Call for New Cyber Security Laws By Kris Osborn Thursday, February 27th, 2014 3:13 pm Posted in Cyber Security S...

We're stepping up to security certifications. R...

engineyard.com 19 Feb '14, 4pm

Engine Yard Advances Commitment to Security and Governance for Business Critical Apps New Managed Support Offering Allows ...

Build Your Own Underground Greenhouse

Build Your Own Underground Greenhouse

jetsongreen.com 23 Feb '14, 7am

Growing food in the colder months of the year is a challenge, and growers in colder climates that want to extend the crop-...

5 Tips For Working With A PR Firm To Build Links

searchengineland.com 18 Feb '14, 2pm

We’ve talked recently about the overlap of SEO and Public Relations, and as companies continue to shift away from old link...

@SamuelBerthe

guides.rubyonrails.org 23 Feb '14, 9am

The threats against web applications include user account hijacking, bypass of access control, reading or modifying sensit...

Security experts raise flags over #WhatsApp

Security experts raise flags over #WhatsApp

straitstimes.com 22 Feb '14, 2am

WASHINGTON (AFP) - The Facebook deal for WhatsApp drew attention for its whopping price tag, but has also brought out fres...

Complete guide on keyword research - Black Hat ...

blackhatworld.com 22 Feb '14, 10am

Re: Complete guide on keyword research Its nice to see a guide thats really simple and broken down like that. Gives me som...

Bitcoin Security Model: Trust By Computation

forbes.com 20 Feb '14, 9pm

Bitcoin is a distributed consensus network that maintains a secure and trusted distributed ledger through a process called...

Build your own Pi camera with @Adafruit

Build your own Pi camera with @Adafruit

element14.com 17 Feb '14, 9pm

Adafruit recently announced that anyone who is interested in building their own camera can merge its $35 touch-screen with...

Singapore church's anti-gay lifestyle 'guide' l...

sg.news.yahoo.com 17 Feb '14, 3am

"I am young and single. I am writing because I shudder at the way society is going today." "I have homosexual friends. I d...

Eyebrow Windows

naturalhomes.org 22 Feb '14, 7am

These eyebrow windows are on a traditional timber frame building in Poland by Polish architect Sebastian Piton . Eyebrow w...