leereamsnyder + security   121

7 Principles of Rich Web Applications
This is great. I would say an application that implements any, let alone all, of these principles is a step above the average
javascript  webdesign  design  ux  performance  security  programming 
9 weeks ago by leereamsnyder
Securing Web Sites Made Them Less Accessible – Eric’s Archived Thoughts
I think HTTPS is probably a net positive overall, and I don’t know what we could have done better.  All I know is that I saw, first-hand, the negative externality that was pushed onto people far, far away from our data centers and our thoughts.
internet  security  performance 
10 weeks ago by leereamsnyder
IndieAuth - Sign in with your domain name
add rel="me" to your homepage that links to twitter/github/google, then have your social account link back to your homepage. Then you can use the external service to authenticate
security  webdesign 
december 2017 by leereamsnyder
Web Form Conundrum: disabled or readonly? | Aaron Gustafson
“TL;DR: If you really need it, which you probably don’t, readonly is what you want.”
forms  webdesign  javascript  usability  security 
november 2017 by leereamsnyder
When the World Is Led by a Child - NYTimes.com
“We’ve got this perverse situation in which the vast analytic powers of the entire world are being spent trying to understand a guy whose thoughts are often just six fireflies beeping randomly in a jar.”
politics  security  government 
may 2017 by leereamsnyder
Social Media Needs A Travel Mode (Idle Words)
“Companies that have maneuvered billions of people into storing their most personal information on their servers, and worked aggressively to insert themselves into every facet of social and family life, owe it to their users to fight, and fight hard, for their safety.

If you want to put an always-on microphone in my home, then protect me at the border.”
politics  facebook  privacy  security  google  socialnetworking 
february 2017 by leereamsnyder
Life plus Linux: Look before you paste from a website to terminal
make sure that you paste code snippets from untrusted sources onto a text editor before executing it.
computers  security  commandline 
january 2017 by leereamsnyder
Let them paste passwords - NCSC Site
No one knows where the advice to not allow pasting came from!
javascript  security  password  forms  usability 
january 2017 by leereamsnyder
Hidden Expectations - daverupert.com
Security, privacy, performance, and accessibility are not-always-discussed responsibilities
accessibility  webdesign  security  privacy  performance 
august 2016 by leereamsnyder
Things to Know (and Potential Dangers) with Third-Party Scripts | CSS-Tricks
“Third-party scripts can provide powerful functionality, but they also bring risks to privacy, security, performance, and page behavior. Now that you've seen some of the risks of third-party scripts, you'll hopefully have an idea of what to expect when you encounter them.”
javascript  performance  security  webdesign 
june 2016 by leereamsnyder
Adding HTTPS to your web site - Robert's talk
“My bet is that you’ll spend 1% of the time changing your own internal references to https://, then the remaining 99% figuring out about third-party content and how to securely include that.”
webdesign  programming  security  performance 
april 2016 by leereamsnyder
The Apple–FBI Showdown Shouldn’t Have Happened -- Following: How We Live Online
The FBI shouldn’t, though, get to cheat. It shouldn’t be able to get Apple to do its homework for it, especially when there was so little to gain. It needs to smarten up. It needs to do its job.
security  history  government  police  privacy 
april 2016 by leereamsnyder
London Review of Books - When Bitcoin Grows Up
“Blockchains could become merely a new technique to ensure the continuation of banking hegemony in its current form. That would be one of those final plot twists which leaves everybody thinking that although they enjoyed most of the show, the ending was so disappointing they now wish they hadn’t bothered. Or, along with peer-to-peer lending and mobile payments, they could have an impact as great as the new kind of banking introduced in Renaissance Italy. That would be more fun.”
banking  security  history  economics  money  technology 
april 2016 by leereamsnyder
Arq 5 Brings Significant New Features and a Major Licensing Improvement – MacStories
“If you have more than one Mac (say, for example, a desktop and a laptop), it’s easy to set up Arq to backup the laptop to your desktop, and then you can backup the desktop using Arq, Backblaze, CrashPlan, and/or SuperDuper or CarbonCopyCloner. If you are looking for the most reliable and least expensive solution over time, buying a 3-4 TB external drive plus Arq is probably the way to go. You can either backup to another Mac on your network or (new with version 5) backup directly to a NAS or other folder on your Mac.”
backups  osx  software  security 
april 2016 by leereamsnyder
Best Response to Terror Attacks Like Brussels: Deny Terrorists Fear - US News
“However unpopular, this is the best defense in the face of terrorism, because it denies the terrorists the fear they seek to create. A true show of strength is in the power of resilience, not in the emotion of lashing out.”
government  terrorism  security 
march 2016 by leereamsnyder
A safe way to toggle passwords by Shell Bryson on CodePen
If you toggle between type="password|text", make sure it's "password" when you submit the form
security  forms  ux  usability  browsers  javascript  html 
march 2016 by leereamsnyder
About rel=noopener
Prevents opened tabs/pages from having access to the original window object
browsers  html  javascript  security 
march 2016 by leereamsnyder
Data Is a Toxic Asset - Schneier on Security
“Data is a toxic asset. We need to start thinking about it as such, and treat it as we would any other source of toxicity. To do anything else is to risk our security and privacy.”
data  privacy  security  internet  advertising 
march 2016 by leereamsnyder
Algorithmic password strength instead of requesting "3 symbols" or whatever
security  javascript  password  forms  ux 
october 2015 by leereamsnyder
“The Big List of Naughty Strings is an evolving list of strings which have a high probability of causing issues when used as user-input data.”
security  programming  testing 
august 2015 by leereamsnyder
“Invalid Username or Password”: a useless security measure | Kevin Burke
you are choosing between a better user experience and a worse user experience.
email  password  security  usability  ux 
december 2014 by leereamsnyder
Everything Is Broken — The Message — Medium
People, working together, are immensely and terrifyingly powerful.
privacy  computer  internet  security  government  software 
may 2014 by leereamsnyder
« earlier      
per page:    204080120160

related tags

1password  accessibility  adblock  addons  advertising  apache  apple  architecture  archive  backups  banking  blogs  bookmarks  browsers  chrome  cloud  cms  collaboration  commandline  computer  computers  cryptography  css  culture  data  databases  delicious  design  development  dropbox  economics  ee  eecms  elections  email  expressionengine  facebook  firefox  forms  frames  free  funny  gmail  google  government  guide  hacks  hardware  hatehatehate  history  hosting  howto  html  http  interesting  internet  ios  iphone  javascript  mac  math  money  mysql  node  nodejs  nytimes  osx  password  performance  photography  php  plugins  police  politics  privacy  programming  reference  resources  safari  security  seo  servers  socialnetworking  software  spam  statistics  storage  technology  terrorism  testing  tips  toblog  tools  toread  transportation  travel  trends  tutorials  twitter  ui  upgrades  usability  ux  validation  via:popular  viruses  visualization  wars  web  webdesign  webdev  webhosting  wordpress  xkcd 

Copy this bookmark: