Articles related to idempotence
Dealing With Ruby Vulnerabilities: Pay Attention to Idempotence
Enabling forgery protection is only one way to counteract security vulnerabilities in your Ruby code. You also need to pay attention to idempotence, or the ability ...
A Look at Security Risks in Ruby Code - About.com
The misuse of GET requests to access non-idempotent actions makes launching CSRF attacks easier. GET requests are very difficult to guard against CSRF ...
3 Countermeasures to Protect Ruby From CSRF Attacks - About.com
You also need to pay attention to idempotence, or the ability to keep a value unchanged. In Ruby on Rails, idempotence is particularly important for the GET ...
Book and Software Reviews Page - C/C++/C - About.com
Read book reviews on all aspects of software development for C, C++ and C#.
Securing Ruby Code - About.com
With increasing numbers of large-scale projects being written in Ruby, programmers need to know how to secure their code. There are several entire classes of ...
RESTful Authentication - Ruby - About.com
Related Articles. Step 3: Authentication with Devise · Practical Rails Projects · RESTful Resources · Dealing With Vulnerabilities: Pay Attention to Idempotence ...
CSRF - Cross-site Request Forgery - Ruby - About.com
Another thing exploited in a typical CSRF attack is the improper use of GET requests and idempotence. As per the HTTP RFC (the official specification for HTTP), ...
The Comments Form - Ruby - About.com
Related Articles. Dealing With Vulnerabilities: Pay Attention to Idempotence · What is a Controller? A Security Attack On Ruby Code · A Look at Security Risks in ...
The Telegraph Garden at Chelsea 2013 - Simple and Restful
Related Articles. Dealing With Vulnerabilities: Pay Attention to Idempotence · What's in a Lie? Here's What the Bible Says ...
What's New in Sinatra 1.1? - Ruby - About.com
Oct 24, 2010 ... A Comparison of 'GET' and 'POST' Methods for HTML Forms · Dealing With Vulnerabilities: Pay Attention to Idempotence · Hello, Sinatra!