5 most annoying website features I face as a blind person every single day
For blind and visually impaired people like me, accessibility is the difference between us being able to use a website and clicking off it.
source
Weekly newsletter about leadership, technology, books and anything else we felt compelled to share with others
For blind and visually impaired people like me, accessibility is the difference between us being able to use a website and clicking off it.
source
I’ve learned that the biggest difference between someone that has mastered a language, framework or tool and someone who hasn’t lies in the mental models they use. One person will have a clear and advanced one and the other will not.
source
Code formatting is the subject of millions of fiery, nerdy debates. Developers love to argue about code style because we read code a lot. The style matters because it affects readability.
source
With an increasing number of breaches, intrusions, and data thefts, securing a web application is extremely important. On the other hand, programmers often do not have a strong grasp of how attacks work and how to mitigate them. This post attempts to close that gap a little.
source
So if you’ve always fancied yourself a bit of a wordsmith and you’re convinced you could be the next Stephanie Meyer (is she still a relevant reference? Is Twilight still cool?) here’s what you need to know about self-publishing.
source
Instead of stretching your mind beyond its limits by consuming 100% of the information you come across in case you might need it, why not learn as you need it?
source
DoS attacks are simple but can be devastating: an attacker crafts and sends traffic to your app in a way that overwhelms your servers. (…) This article (…) provides a framework for engineering and application security teams to think about denial-of-service risk, breaks down DoS vulnerabilities into high-, medium-, and low-risk classes, and has recommendations for mitigations at each layer.
source
Web cache poisoning has long been an elusive vulnerability, a ‘theoretical’ threat used mostly to scare developers into obediently patching issues that nobody could actually exploit. In this paper I’ll show you how to compromise websites by using esoteric web features to turn their caches into exploit delivery systems, targeting everyone that makes the mistake of visiting their homepage.
source
You probably already know that listening to music no longer requires trips to a music store, or purchasing individual songs or albums from iTunes to download to your computer. Today’s best music streaming services have millions of songs in their catalogs, offer personalized playlists, and feature exclusive internet radio shows and podcasts. But which should you pick and pay a subscription fee for?
source
The World Wide Web’s inventor, Tim Berners-Lee, has launched a way to make it easier for people to control their personal data. Will it take off?
source
In this article, we’ll look at the most commonly used methods for handling web authentication from the perspective of a Python web developer.
source