1. Tech

Articles related to idempotence

Dealing With Ruby Vulnerabilities: Pay Attention to Idempotence
Enabling forgery protection is only one way to counteract security vulnerabilities in your Ruby code. You also need to pay attention to idempotence, or the ability ...
http://ruby.about.com/od/security/a/idempotence.htm
A Look at Security Risks in Ruby Code - About.com
The misuse of GET requests to access non-idempotent actions makes launching CSRF attacks easier. GET requests are very difficult to guard against CSRF ...
http://ruby.about.com/od/security/a/analysiscode_4.htm
3 Countermeasures to Protect Ruby From CSRF Attacks - About.com
You also need to pay attention to idempotence, or the ability to keep a value unchanged. In Ruby on Rails, idempotence is particularly important for the GET ...
http://ruby.about.com/od/security/tp/countermeasures.htm
Book and Software Reviews Page - C/C++/C - About.com
Read book reviews on all aspects of software development for C, C++ and C#.
http://cplus.about.com/od/books/
Securing Ruby Code - About.com
With increasing numbers of large-scale projects being written in Ruby, programmers need to know how to secure their code. There are several entire classes of ...
http://ruby.about.com/od/security/
CSRF - Cross-site Request Forgery - Ruby - About.com
Another thing exploited in a typical CSRF attack is the improper use of GET requests and idempotence. As per the HTTP RFC (the official specification for HTTP), ...
http://ruby.about.com/od/rails3tutorial/ss/Csrf-Cross-Site-Request-Forgery.htm
RESTful Authentication - Ruby - About.com
Related Articles. Step 3: Authentication with Devise · Practical Rails Projects · RESTful Resources · Dealing With Vulnerabilities: Pay Attention to Idempotence  ...
http://ruby.about.com/od/rubyonrails/ss/railsblog3_2.htm
The Telegraph Garden at Chelsea 2013 - Simple and Restful
Related Articles. Dealing With Vulnerabilities: Pay Attention to Idempotence · What's in a Lie? Here's What the Bible Says ...
http://gouk.about.com/od/ukgardensandgardening/ss/Chelsea-Flower-Show-2013-Show-Gardens-With-Something-For-Everyone_4.htm
Dealing With Ruby Vulnerabilities: Enable Forgery Protection
However, the example application does not pay attention to idempotence and the database can be altered via GET requests as well. The protect_from_forgery ...
http://ruby.about.com/od/security/a/forgeryprotect.htm
GET versus POST Requests on HTML Forms - Web Design/HTML
These are considered “safe” or idempotent requests. For example: When a customer clicks on a link in an Ajax photo gallery application that advances the app to ...
http://webdesign.about.com/od/forms/a/get-and-post-requests.htm
1  |  2      Next

©2014 About.com. All rights reserved.