Monday 18 March 2013

Top 25 peoples who changed internet forever::


Top 25 peoples who changed internet forever::

1• Sir Tim Berners Lee – World Wide Web
2• Vint Cerf And Bob Kahn –TCP/IP
3• Larry Page and Sergey Brin – Google Inc.
4• David Filo and Jerry Yang – Yahoo! Inc.
5• Bill Gates – Microsoft
6• Steven Paul Jobs – Apple Inc.
7• Mark Zuckerberg – Facebook
8• Chad Hurley and Steve Chen – YouTube
9• Linus Torvalds – Linux
10• Jack Dorsey – Twitter
11• Kevin Rose – Digg
12• Bram Cohen – Bit Torrent
13• Mike Morhaime – Blizzard Entertainment
14• Jimmy Wales – Wikipedia
15• Jeff Preston Bezos – Amazon
16• Shawn Fanning – Napster, Rupture
17• Pierre Omidyar – eBay
18• Jack Ma – Alibaba
19• Craig Newmark – Craigslist
20• Matt Mullenweg – WordPress
21• Thomas Anderson – MySpace
22• Garrett Camp – Stumble Upon
23• Jon Postel – Internet Pioneer
24• Caterina Fake – Flickr
25• Marc Andreessen – Netscape

Tuesday 15 January 2013

How to Prevent Cross-Site Scripting (XSS) Attacks

Worried regarding distributed denial-of-service and SQL injection attacks on your website? you ought to be. however do not stop there, as a result of likelihood is you are commanding what's probably the foremost prevailing web site attack today: specifically, cross-site scripting (XSS). In one recent study, seventy five % of U.S. government websites were found to be liable to XSS attack.

XSS attacks exploit the link between the user and also the electronic computer he or she is accessing. once you visit an internet web site, there's a presumption that the information transferred between your browser shopper and also the net server is visible solely to the owner of the online web site and its licensed partners. however once associate XSS attack muscles its manner into this relationship, it will expose information to a malicious third-party – while not the information of either the end-user or electronic computer owner.

The same-origin policy

One methodology accustomed enforce trust in net applications is to limit code to interacting with information from an equivalent origin server. for instance, suppose that an internet web site closely-held by bigcorp.com includes 2 external Javascript files, one hosted at bigcorp.com and also the different at noodlecorp.com.

The code downloaded from bigcorp.com will access document components on the page generated from bigcorp.com; for instance, this might embrace fields with a username or watchword, or info like a user's account balance. This code also can turn code from the other scripts downloaded from bigcorp.com, like strategies or functions.

But the code downloaded from noodlecorp.com is usually prohibited from accessing these components. This "same-origin policy" protects the user as a result of we do not apprehend if the code from noodlecorp.com will be trustworthy . 

In apply, the same-origin policy isn't equally enforced altogether net browsers, and even web content will expressly expand the vary of origin domains allowed to share information. The goal of associate offender is to slide code into the browser below the color of conformist to the same-origin policy.

To achieve this, XSS attacks generally be 2 strategies: mirrored attacks and protracted attacks.

Reflected XSS


In a mirrored cross-site scripting attack, the user unknowingly sends code to an internet server that then "reflects" that code back to the user's browser, wherever it's dead and performs a malicious act.

For example, contemplate an internet web site that accepts user input within the type of a look request. Suppose that the online application returns the search request with the results (or lack thereof), like "Results of your explore for XYZ…"

Now suppose that the code that processes user input (either on the shopper facet or server side) doesn't adequately sanitize the input. A hacker might craft user input that truly contains client-side code like Javascript.

When the online application reflects the user input as output to the browser, it passes the same-origin policy check. This code might be lateen-rigged to retrieve sensitive info from the end-user and deliver it to a server controlled by the offender.

In a typical mirrored XSS attack, the malicious code are going to be baked into a link that's given to the end-user. This link may be delivered via a phishing e-mail, for instance, within the hopes of harassment the user into clicking it and triggering the attack sequence.

Persistent XSS

The scale of a mirrored XSS attack is restricted by what percentage users will be tricked into launching the malicious code. associate offender WHO desires to use XSS on an oversized scale can value more highly to use a persistent XSS attack.

The basic mechanism in an exceedingly persistent XSS attack is that the same – to engraft malicious code into an internet page delivered by the server, in order that it satisfies the same-origin policy. however during this strategy, the offender plants this code into an internet page that each traveler can see.

Consider a web-based discussion board. The messages announce to a discussion board square measure seen by everybody WHO visits that page, however the content is submitted by a user. If the offender will plant malicious code into a message they post themselves, most guests to it page can finally end up unknowingly execution the code.

Once again, the fundmanetal vector being exploited is insufficient sanitizing of user input. Message board posts – or any electronic computer that shows user submissions – essentially display content announce by unknown parties. If this content isn't completely clean ofpotentially malicious code, a persistent XSS attack will simply be planted on the positioning.

Consequences of associate attack

XSS code will be crafted to raise a spread of sensitive information together with any info given on an equivalent page wherever the cross-site code was planted. however the foremost dangerous risk is that the thieving of user authentication credentials.

Many sites save authentication or session credentials in an exceedingly browser cookie. Malicious code will raise this cookie and send it to a server controlled by the offender. thereupon cookie in hand, the offender may be able to access an equivalent electronic computer masquerading because the victim user, bypassing any login.

Even if the compromised web site doesn't offer access to sensitive content like e-mail or finances, a hacker may be able to access personal details which will be leveraged against a a lot of sensitive web site like the user's webmail account.

Malicious code also can be designed to change the content on the page given to the positioning traveler. One nasty trick would be to vary the destination of a link on the page (or gift a brand new link that the traveler is desperately told to click), harassment them into visiting a malicious web site absolutely built by the offender to launch a a lot of serious attack.

Alternatively, associate offender may use associate XSS attack against the positioning owner instead of the positioning traveler. an equivalent trick of neutering output will be accustomed vandalise content – imagine a news web site wherever the XSS attack defaces headlines and undermines the quality of the positioning.

Defending against XSS


Ultimately, XSS may be a form of code injection terribly similar in nature to SQL injection. Like protective against any code injection attack, the most effective defense is thorough and well-tested santization of any and every one user input.

Site homeowners have to be compelled to verify each input path by that their electronic computer accepts incoming information. every path should be hardened against malicious information which will represent possible code. typically this needs implementing mulitple filters on the communication pathway – for instance, an internet application firewall like ModSecurity and input cleanup inside server-side input process code.

Developers ought to additionally use tools like XSS Maine for Firefox or domsnitch for Google Chrome to check their own sites for XSS vulnerabilities.