Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Ajax Security Tools 16

IdaAshley points out the latest from IBM developerWorks' Web development section, which talks about shoring up potential weaknesses in Ajax applications. It follows another recent guide for improving Ajax performance. "In this article, you'll learn about Ajax security tools, which you'll be using to scan for SQL injection and cross-site scripting vulnerabilities; to set a master password; and to restore the state of all windows after crashes. You'll take a look at tools and utilities that ensure that linked Web sites in applications are not on the blocked lists and which prevent hackers from altering browser functionality, defacing Web applications, and achieving malicious results. You'll find these utilities divided into three types within the article: hardening tools, Firefox tools, and Firefox add-ons."
This discussion has been archived. No new comments can be posted.

Ajax Security Tools

Comments Filter:
  • by Anonymous Coward
    This is a great article, because it's given me exactly what I needed. Thanks to Ajax and IBM, I've already got a hardening tool right here in my hand.
    • Re: (Score:1, Offtopic)

      by Vectronic ( 1221470 )
      lol
    • Re: (Score:1, Informative)

      by Anonymous Coward
      This is a great article, because it's given me exactly what I needed. Thanks to Ajax and IBM, I've already got a hardening tool right here in my hand.

      Well-done, destined to become a classic!

      N00bs, take note:

      1) This is short, and sweet. Not some 3000-line cut-n-paste about someone getting it on in a men's bathroom.
      2) It's relevant to TFA, or at least appears to be
      3) Punchline/troll is right at the end, which means you're hooked before you realize it. By the time you do, it's too late!
  • by Anonymous Coward
    You lie!

    Ajax was second only to Achilles during the Trojan War! And Achilles--oh wait. Perhaps he does have a weakness. But considering that he didn't die while Achilles did, I think we can safely say that when you associate security and Ajax in one sentence you had better be talking about security against Ajax. Ajax is strong, not weak! It is the application programmers that are weak. Let's see them take on the Trojans before they complain about Ajax's weaknesses.
  • by Anonymous Coward
    It's a pity that the web is becoming an application development platform, because it really sucks as an API. Unfortunately all other contenders are either too much like the web (XUL) or proprietary (Silverlight, Flex). Browser security is a bitch with just web pages. Wait until people expect cross-site integration from their web applications...
  • HTMLProtector (Score:2, Insightful)

    by efence ( 927813 )

    HTMLProtector helps you:
    • Prevent visitors from viewing and printing your source code.
    Yes! Because it always worked in the 90s! I see no reason why it can't work now!
    • If it turns most of the html into one big gif and an image map then it should "work". Bonus for being just like the 90's!
    • Re: (Score:2, Informative)

      It is even better than that. It has javascript password protection. This will naturally keep your site perfectly secure. I thought perhaps this might be a possible one where it could work with some kind of strong encryption actually based on the password. I was disappointed after looking at the trial however since I cracked it by simply using trial and error to remove bits of code until I narrowed it down the the correct bit. Then the page was free for viewing.

      And naturally one of the main ways I wou
  • Homeland Security Threat Levels

    This extension displays the current U.S. Homeland Security Threat Level (Severe, High, Elevated, Guarded, and Low) as an icon in the status bar, allowing you to see the threat level at a glance.


    Not really sure what this has to do with AJAX security, thanks IBM!
    • Re: (Score:3, Funny)

      by deniable ( 76198 )
      When DHS raises the level you have to bill your clients for extra security work. If you're a real good consultant, you'll find a way to bill them when it comes back down. IBM thinks of everything.
  • by Anonymous Coward
    But wow, that was fucking terrible.
  • Isn't that an oxymoron?

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...