April 2010 JQuery Goodness Roundup

| 0 comments

Here it is April and that means it is time for another roundup of jQuery plugins that will greatly assist you in making short work of your development efforts while at the same time pleasing the end user. I have noticed that there are quite a few of new jQuery plugins out there and they really caught my attention as well as the proven older plugins that I have found useful. If you have a favorite plugin why not leave a comment and share wit the community? TextBoxes and DropDowns FlexBox (CodePlex) JQuery DropDown Drag and Drop JQuery List DragSort Table Drag and Drop JQuery plugin Collapsible Drag & Drop Panels Using jQuery JQuery Iconize Plugin Menus ASP.NET Multi-Level Drop Down Menu QuickSand Horizontal Accordion Jeegoocontext jsTree jBreadCrumb LightBox JQuery LightBox prettyPhoto ThickBox Animation Spiritely Page Curls S3 Slider Charts and Graphs JQuery Visualize Date and Time jMonthCalendar Date Range Picker DateJs

Secure Code With The Microsoft Anti-Cross Site Scripting Library

| 0 comments

Recently I attended a Security Development Lifecycle training course in Dallas, Texas and I must admit while I was aware of many vulnerabilities in web applications, I learned just how easy it is to do some real damage if software engineers don’t fully understand the implications they face when developing a web application. In fact, while I was researching statistics on this topic I ran across a statistic that stated applications today contain more security flaws themselves than the operating system that they run on. Now stop and think about this for a moment. Typically companies do everything in their power to patch the operating system, stand up firewalls, and generally control access. If a web application for example does not account for security unauthorized individuals many gain access or worst case scenario steal data that can be detrimental to a company should it fall into the wrong hands. Here are three areas that I believe you should focus on to get you started. Validate input: Validate input from all untrusted data sources. Proper input validation can eliminate the vast majority of software vulnerabilities. Enforce security policies: Create software architecture and design your software to implement and enforce these security …

Continue reading