Resource Expert Droid – Analyze HTTP Requests
The Resource Expert Droid – or Redbot in short, is an online tool to analyze HTTP requests. It provides decent information about response headers and the request headers can be configured as well...
View ArticleEncoding of the robots.txt file
The old, rusty tech-monster from swamp, beloved robots.txt, that did prevent gaga-gone droids from DDOSsing your servers years ago, still has its place in SEO, SEM and generic robots access control...
View ArticleTeam playing the hashcat card in Korelogic’s “Crack Me If You Can” DEFCON...
A relativly small team has had great success at DEFCON 2010 in this years “Crack Me If you can” competition sponsored by Korelogic Inc, a US-based information security company. The team was using a...
View ArticleDisable Stylesheets in Internet Explorer
Microsofts Browser, the Internet Explorer, is somehow hated by Webdesigners and Developers throughout the world. But still there is discussion over here and there whether or not to support the Browser...
View ArticleDisplay Errors on Production Sites – Today: Adult Swim
Geeeez! The purple pixel robot is talking to me: Warning: Invalid argument supplied for foreach() in _adultswim_get_term_name() (line 395 of / docrootas20/ sites/ all/ modules/ publicreative/...
View ArticleSlow Crawling Fixes
WordPress 3.0.2 went out some days ago. Announced as security release (full 3.0.2 Changelog) for the stable wordpress version. While taking a look into the changelog, I got a little flashback. The most...
View ArticleWordPress Licensing Issues – Plugins are GPL, Right?
If you thought that the wordpress package you can download from wordpress.org is re-distributable under GPL, then you’re thinking wrong. Why do I say so? Thanks to a ticket opened by novasource, it...
View ArticleWebsocket Protocol Vulnerability
Linked: Disabling the WebSocket protocol (by Anne van Kesteren; 08 Dec 2010). This HTML 5 looks to be a scary mess security wise. I hope the browser vendors do their jobs. Tagged: HTML 5, Security
View ArticleBest Practice robots.txt
I did some research month ago and wrote a longer article about robots.txt. But for a quick lookup it’s too much to read, so today it’s time a for a simple best-practices check-list: Use ASCII encoding...
View ArticleHow-To Block Alexa Robot
It’s easy and can save you some bandwidth per month, just add the following to your robots.txt file: User-agent: ia_archiver Disallow: / Additionally it saves you to get too much information...
View ArticleWill Automattic join Dec 29 move away from GoDaddy day?
With all the reports about SOPA and GoDaddy (Mashable, PC World, ars technica, Read Write Web, VentureBeat, …) I was wondering if Automattic, one of GoDaddy’s customers, has been taking note of...
View ArticleArchitecture the Lost Years (Robert Cecil Martin; 4 Nov 2011)
Did worldwide Hypertext turned software developers out in the field upside-down? In Architecture the Lost Years (1h 06m) Robert C. Martin talks about the web and how it influenced development design...
View ArticleThe Daily Mistake: Not to Proxy Remote Services
“Just gimme a min, I glue that HTTP based remote service in.” – Whether the standard file_get_contents + Json *bam* or complete SOAP, a developer should have the time to wrap each (remote) data-source...
View ArticlePrepared Statements
In Programming With Anthony – Prepared Statements (by Anthony Ferrara; 12 Dec 2012) the author needs only two minutes and 17 seconds (Youtube Video) to explain *Prepared Statements*. Worth to watch....
View ArticleDive Into HTML5
Dive Into HTML5 (by Mark Pilgrim with contributions from others) Tagged: HTML5, Lecture
View ArticleMitigating XPath Injection Attacks in PHP
PHP has two libxml based extensions that allow to execute XPath 1.0 expressions: DOM (by the DOMXPath class) and SimpleXML (with its xpath() method). Both extensions are prone to XPath Injection...
View ArticleThe Negative Influence of WordPress on PHP
The current The TIOBE Programming Community Index for July 2013 shows an increase for PHP, gaining grounds fast and as an ongoing trend over the last year: If compared to January 2013, PHP is the...
View ArticleXPath Null Byte Injection in PHP
Back in July this year, in Mitigating XPath Injection Attacks in PHP I was writing about how to properly quote a string in PHP’s Xpath 1.0. The code presented there was based on the assumption that the...
View ArticleDocker Run without “docker run”
So there was this one question on Stackoverflow in which the OP was linking an .htaccess tester for Mod-Rewrite-Rules. Despite this being all fine I was asking myself what about really(tm) testing...
View ArticleAn Exquisite Amble through the Realm of Desugaring
Bonjour Confrères and Consoeurs, Ai, Yay, Yay, wish to invite you on a captivating sojourn into the sophisticated sphere of Desugaring. In the lexicon of programming, Desugaring denotes the elegant...
View Article