The CSV-to-SortTable WordPress plugin is a handy little tool for site owners, but its codebase shows that it was not built with hackers in mind. CSV-to-SortTable does not validate files…
Security
All things Internet security
Ecommerce fraud is a favorite for hackers all year, but Christmas time is especially popular for account takeover and credential stuffing. Account takeover (ATO) happens when an attacker has a…
Remember when every school of thought trained you to never have a single point of failure? That’s still considered the right standard, but CloudFlare and AWS usage has become the…
A common programming mistake is thinking that what can’t be seen on the public web can’t possibly be a vulnerability. WordPress site owners entrust their security to plugin developers, which…
You probably know that your HTTP requests will likely use TLS (Transport Layer Security) to create an encrypted connection, but most developers don’t know what happens in a client-server connection…
Most applications need a database to store backend data, and Google Firebase is a great choice for serverless data management. It’s a cloud-based database hosted in Google Cloud, and it’s…
It’s common in coding to work with CSV (Comma Separated Values) files to transfer data between platforms or allow users to download files that can then be used in their…
As a programmer, you will often work with user sessions. A user session is a randomly generated alphanumeric value that identifies the user on the server. In most applications, the…
When a software developer codes a variable into their application, the system allocates a specific number of bytes to hold data. Usually, the data passed to the variable is from…
I recently moved a website from an Azure app service that was costing way too much for a small WordPress site to a virtual machine that gave me more control…
