64x64 icon dark hosting
Choose a hosting plan here and get a free year's subscription to Tuts+ (worth $180).
Advertisement

Security

  • Security
    Using Google Two-Factor Authentication With WordPressPreview
    437 shares
    Secure your WordPress site with two-factor authentication, using this simple plugin for Google's Authenticator app. This tutorial will walk you through setting up the Google Authenticator WordPress plugin for your own sites.Read More…
  • WordPress
    A Guide on Using the iThemes Security PluginIthemes security preview
    227 shares
    Every popular service or product constantly gets threatened by evil minds. No matter which measure you take, you can't achieve 100% security on the internet. But with the right tools and some common sense, we can try 99.99%, can't we?Read More…
  • PHP
    How to Build Rate Limiting into Your Web App LoginPreview
    284 shares
    Apple's failure to rate limit iCloud logins likely contributed to celebrity photo hacking. Here's how to protect your own apps.Read More…
  • WordPress
    Options for SSL in WordPressWp error
    409 shares
    With the ever increasing focus on web security, SSL certificates are started to become common practice when setting up websites. This article will show you how to implement SSL in to your WordPress website using two different methods.Read More…
  • Web Development
    Authorization and Protecting Web Resources in ASP.NETDotnet wide retina preview
    102 shares
    As a web developer, an important security aspect of a site them comes in ensuring that users do not have access to actions they should not perform. The consequences of not protecting it can be serious. Let’s look at an overview of authorization and how to implement it in ASP.NET.Read More…
  • ASP.NET
    Preventing XSS in ASP.NETDotnet wide retina preview
    157 shares
    Learn how to secure your ASP.NET web applications via external input validation, .NET's Request Validation, proper HTML encoding and using the AntiXSS library. Read More…
  • Security
    Best Practices When Working With Sensitive Data: Securing Your ApplicationSecure wide retina preview
    327 shares
    Last time we learned how to secure our server, this time we'll cover securing sensitive data from within our application itself. We'll discuss proper database security, password salting with examples, and user privileges. Let's begin!Read More…
  • Web Development
    Best Practices When Working With Sensitive Data: Securing Your ServerSecure wide retina preview
    240 shares
    Learn best practices for securing your web application's server. We'll discuss choosing server providers, what to do with disk failures, password security, OS specific security tips and much more.Read More…
  • Web Development
    Securely Handling User's Login CredentialsSecure wide retina preview
    263 shares
    Consider the following tips on how to properly secure your user's login credentials.Read More…
  • Security
    Cross-Site Scripting in WordPress: Practical Tips for Securing Your SiteCross site scripting in wordpress what is xss
    27 shares
    In this series, we're taking a look at how to secure our WordPress projects from XSS - or cross-site scripting. In the first article in the series, we defined what cross-site scripting actually is, understanding how it works, and why it's dangerous. We also spent some time discussing how this impacts our day-to-day WordPress development efforts and what we can do about it. Although there are some functions that WordPress has available to help validate and sanitize data, there is more work that we can do in order to secure our projects. In this final article, we're going to take a look at some practical tips that we can follow and some tests that we can administer to secure our work against XSS attacks.Read More…
  • Security
    Cross-Site Scripting in WordPress: What Is XSS?Cross site scripting in wordpress what is xss
    8 shares
    One of the most exciting aspects of modern web development is the potential that comes with building applications specifically for web browsers (or to run "in the cloud.") Originally, Java was meant to be the "write-once, run-anywhere" solution, but it appears that the web has become the perfect medium for that. Who would've thought, right? But along with the various browsers that we have available, the technologies that we can leverage, and, quite simply, the neat things we can do, there's still a dark underbelly to web application development - cross-site scripting. And considering that WordPress is a web application on which many of us build for fun, profit, or to make a living, it's a topic that we shouldn't avoid especially if we want to have the most robust products possible. In this two part series, we're going to take a look at what cross-site scripting really is, its dangers, how it impacts WordPress development, and then practical steps that we can take for testing our themes and plugins.Read More…
  • Security
    WordPress Security Threats That You Should Look Out ForSecurity vault
    46 shares
    When running a website on WordPress, it is sensible for you to pay attention to security. There are constant threats to blogs and sites running on WordPress. Oftentimes, you will find out about a security breach after it has happened. The better option is preventing the threats from materializing than reacting later. Being proactive with WordPress security might be the best thing you ever did. Here are five WordPress security threats you should look out for and also how you can prevent them.Read More…
Advertisement
Suggested Tuts+ Course
PHP Security Pitfalls$15
Advertisement