SEO for Web Developers Part 2

Some experts say search only drives 30 percent of a website’s traffic.While that may seem insignificant, that 30 percent often makes up visitors who are looking for the products, services or information specific to your company so losing them could have a significant impact on how well an organization performs.

5 iPad Apps Every Web Developer Must Have

When you are stuck waiting in line or for an appointment your iPad can your saving grace.Not just to check your Google+ account or play a quick game of Trailer Park Zombies, but to get actual work done.That is if you have the right apps.Listed below are some of the best apps for web developers. And this list isn’t one that only contains a few time management and task list apps. You might actually be surprised at how much you can get done with your iPad.

What Web Developers Need to Know About Cross-Site Scripting

Alice created a new social network for snowboarders to promote her company’s new line of boards. Now, a member of the social network can read reviews from other satisfied customers and click a link that brings them right to a shopping cart feature so they can make an easy purchase.Happy with the way things look, and with the thought of all the potential sales, her boss gives her the OK for the site to go live.Mallory visits the network and creates a review of her own. Noticing that she can enter a client-side script into her posting, she attaches a malicious payload to the script.

What Developers Need to Know About Cross Site Request Forgeries

Cross Site Forgery, or cross site request forgery (CSRF), is a web based attack where a malicious web site, instant message, email, or program causes the victim’s Web browser to perform an unwanted action on a trusted site for which the user is currently authenticated.For example, let’s say I am logged into my bank account, or cookie information is stored from a recent login, and I click on a malicious link.

Top Three Lists Regarding Web Application Security

I recall a project I worked on a few years ago where I was tasked with overseeing the security of a website we were building. When I sat down with the chief programmer I wanted to discuss three types of vulnerabilities with him: cross-site scripting, SQL injection and information leakage. His response was simply, “I don’t know anything about this stuff and I don’t care. That’s your job.”