Articles related to idempotence
Dealing With Ruby Vulnerabilities: Pay Attention to Idempotence
Enabling forgery protection is only one way to counteract security vulnerabilities in your Ruby code. You also need to pay attention to idempotence, or the ability ...
A Look at Security Risks in Ruby Code - About.com
The misuse of GET requests to access non-idempotent actions makes launching CSRF attacks easier. GET requests are very difficult to guard against CSRF ...
3 Countermeasures to Protect Ruby From CSRF Attacks - About.com
You also need to pay attention to idempotence, or the ability to keep a value unchanged. In Ruby on Rails, idempotence is particularly important for the GET ...
Book and Software Reviews Page - C/C++/C - About.com
Read book reviews on all aspects of software development for C, C++ and C#.
Securing Ruby Code - About.com
With increasing numbers of large-scale projects being written in Ruby, programmers need to know how to secure their code. There are several entire classes of ...
CSRF - Cross-site Request Forgery - Ruby - About.com
Another thing exploited in a typical CSRF attack is the improper use of GET requests and idempotence. As per the HTTP RFC (the official specification for HTTP), ...
RESTful Authentication - Ruby - About.com
Related Articles. Step 3: Authentication with Devise · Practical Rails Projects · RESTful Resources · Dealing With Vulnerabilities: Pay Attention to Idempotence ...
GET versus POST Requests on HTML Forms - Web Design/HTML
These are considered “safe” or idempotent requests. For example: When a customer clicks on a link in an Ajax photo gallery application that advances the app to ...
The Telegraph Garden at Chelsea 2013 - Simple and Restful
Related Articles. Dealing With Vulnerabilities: Pay Attention to Idempotence · What's in a Lie? Here's What the Bible Says ...
What's New in Sinatra 1.1? - Ruby - About.com
Oct 24, 2010 ... A Comparison of 'GET' and 'POST' Methods for HTML Forms · Dealing With Vulnerabilities: Pay Attention to Idempotence · Hello, Sinatra!