Security these days isn't just for professionals--if you're online, you have to take steps to stay secure. These articles will help you do just that!

  • Security

  • An Introduction to JSON Web Tokens (JWT)

    Diogo Souza walks you through what JSON Web Tokens are and how JWTs work.

  • Explore Using Enzyme for React Testing

    One of the biggest advantages of React is undoubtedly using Enzyme to test components, while taking full advantage of the virtual DOM. We can also explore Jest's powerful tools as a snapshot and create a mock test for external modules.

  • Avoiding Dark Patterns

    Web developers are always trying to give users an honest experience, but as you know, most digital interactions come with a certain risk level. Octavia Anghel explains what dark patterns are and how to avoid them.

  • Securely Store User Passwords Using Bcrypt Hashing

    In a previous article, we were introduced to the JSON Web Token (JWT) open standard (RFC 7519). In today's tutorial, Rob Gravelle shows us how to create a route that accepts a user's credentials and stores them securely in a MongoDB database using bcrypt hashing.

  • Integrate JSON Web Token Authentication into Single-page Apps

    JSON Web Tokens (JWT) are one of the most widely used authentication mechanisms in modern SPAs. In this article, Rob Gravelle shows us how to set up a SPA in MS Visual Source Code. Within that development environment, we'll build and test an SPA that authenticates a user's credentials against one that is stored securely in a MongoDB database.

  • How to Secure WordPress Theme and Plugin Code

    Follow these steps to help you effectively beef up the security levels of your WordPress website.

  • So You Don't Want to be Hacked with Cross-Site Scripting (XSS)

    If you are creating a site that allows users to enter information, then you need to avoid basic mistakes that can leave your site vulnerable to being hacked.

  • How to Clean Your Hacked WordPress Site Without a Backup

    Learn more about the important steps to identify if your site has been hacked, how to clean the malware or the hack--and how to enhance the security of your website going forward.

  • Date Validation Using Moment.js

    Since the HTML5 date type is still not widely supported by browsers, many site owners choose to accept dates via text input--a decision that places extra burden on date validation. Learn how to use Moment.js's constructor and date validation methods to ensure that user-input dates are legal and valid.

  • How to Secure Your WordPress Site in 2017

    Explore some of the important measures that you can take to ensure the security of your WordPress site.

  • Hackers Do Not Discriminate: Why you should follow these Security Tips

    Knowing is half the battle and in this article you’ll see how to keep your WordPress site safe and secure for all who visit.

  • Mobile Application Security: Mobile Device Management (MDM)

    Companies employ a broad range of tools, services, and policies to maximize employees' freedom while keeping security risks under reasonable control. Rob Gravelle describes the role that Mobile Device Management (MDM) plays in endpoint security.

  • Using a CallBackHandler in Java Authentication and Authorization Services (JAAS)

    Rob Gravelle looks at some popular security framework offerings for the Java applications, explains the basics of JAAS, and goes through a couple of classes that perform a simple login process.

  • Mobile Application Security: Preventing Injection Attacks

    Protecting hardware and data from thieves and hackers takes a multi-pronged approach, whereby application security plays a vital part in the overall scheme. Rob Gravelle discusses how to prevent injection attacks at the application level using a variety of validation techniques.

  • Surviving a Hack

    Whether your site has been up for 10 years or for 10 minutes, web site security and protecting yourself from hackers is something you need to understand. Knowing how to cure a hack is even more important.

  • What's Your Policy? - Creating a Privacy Policy

    Since the internet explosion of the 90’s many people and government agencies have been watching how information, especially personal information, is collected and distributed through the continual advancements in technology. In this article we'll talk about the website Privacy Policy, a tool that's actually a promise to your website visitors, letting them know how the information you collect is protected and distributed.

  • Setting Up a Secure (SSL) Connection

    This week you'll learn how to have the connection between the browser and the Web server encrypted. This guide is designed for use with the typical Apache on Linux configuration.

  • Home Web Server Security Part 2

    In the last article in this series I pointed out some of the potential dangers of running a web server on your home PC. This article is going to discuss what you can do to prevent hack attacks, and also help you learn about web servers in general.

  • Disaster Recovery Planning for the Developer, Part 4

    In our last article we went through the steps of creating a Disaster Recovery Plan for our ficticious business, Don's Web Design. This article, our last in this series, will provide you with the resources you need to complete your own DRP.

  • Disaster Recovery Planning for the Developer, Part 3

    When we last left off, we had discussed what it takes to create a Disaster Recovery Plan (DRP) for your business. In this 3rd part of our series, we'll walk you through the steps it takes to create a DRP for our fictitious business, 'Don's Web Design'.

  • Home Web Server Security Part 1

    My previous articles have focused on effectively securing your computer. This article is for folks who've gone a step further and want to safely and securely set up a web server on their home PC.

  • Disaster Recovery Planning for the Developer, Part 2

    In our last article we touched upon the most basic steps that a developer can take to survive and recover from a disaster. In this article we're going to take disaster recovery planning to the next level--we're going to discuss the Business Continuity Plan.

  • Disaster Recovery Planning for the Developer

    If you are a developer, you probably haven't spent much time thinking about your personal disaster recovery plan. In today's world of major hurricanes and other weather disasters, terrorism, brownouts, hackers, etc, planning for disaster recovery is everyone's burden.

  • Delving Deeper: Basic Windows XP Security

    In this article we'll discuss some basic measures that you can take to make your XP machine a bit more secure.

  • Computer Security for the Novice

    Computer security has become a major issue for everybody who uses one. Allen Kenner, a forum moderator known as 'Gore' at the security site Antionline.com, expresses some of his thoughts and feelings on the subject--and provides advice for those who may be uncertain about their own computer security.

  • Firewalling

    You've heard it said that 'the first level of defense in a modern computer system should be a firewall.' Are the risks really that great? Is this something you need to be paying attention to?

  • Wireless Networks

    Please folks, don't hang a sign outside your house that reads 'Easy Target Here! -- Please Help Yourself!' Check in here for a little wiser approach!

  • The Common Sense Defense

    Your Anti-Virus is in place. It's bang up to date. You're all set, right? Not at all -- read on!

  • Anti Spy, Part One

    Is someone -- or something
    watching you?

  • Anti Spy, Part Two

    Is someone -- or something
    watching you?
    Part Two

  • Anti-Virus Software

    Is there always a need for anti-virus software? Under which circumstances do you really need it, and under which is it not really necessary?

  • Firewall Basics

    While there is no such thing as a fully secure internet connected computer, you can get pretty close with good firewall protection.

  • Identifying "Spoofed" Websites

    Are you certain that the site you are looking at is what it appears to be?

  • PC Security

    An introduction to PC Security

  • Three Golden Rules

    These are the three most important rules for protecting your data

  • Web Development Newsletter Signup

    Invalid email
    You have successfuly registered to our newsletter.
Thanks for your registration, follow us on our social networks to keep up-to-date