Monthly Archives: March 2013

Injection Flaws/ Attack

This post is part of a multi-post series on web application security threats and their solutions. Please visit my introduction article here to know about more security threats and their solutions. Introduction Injection flaws allow attackers to relay malicious code through a web application to another system. These attacks include calls to the operating system […]

Cross Site Scripting (XSS) Attack

Introduction This post is part of a multi-post series on web application security threats and their solutions. Please visit my introduction article here to know about more security threats and their solutions. This type of attack enables attackers to inject client-side script into web pages viewed by other users. XSS flaws occur whenever an application […]

Click Jacking OR UI redress Attack

Introduction This post is part of a multi-post series on application security threats and their solutions. Please visit my introduction article here to know about more security threats and their solutions. In click-jacking attacker hijack user’s click. Click-jacking (also known as a “UI redress attack”) is when an attacker uses multiple transparent/opaque layers to trick […]

Prototype Pattern

Introduction Is a Creational Pattern. This design pattern that is used to instantiate a class by copying, or cloning, the properties of an existing object. The new object is an exact copy of the prototype but permits modification without altering the original. Cloning can be achieved by implementing ICloneable of the System namespace. The only member […]

Difference between MVC & MVP

Introduction Model-View-Controller (MVC) and Model-View-Presenter (MVP) patterns are used for quite a time by many developers/ architects for designing applications. Both (MVC & MVP) patterns have been used for several years and address a key OO principal namely separation of concerns between the UI and the business layers. One question that keeps coming up over […]

Facade Pattern

They fall into structural pattern categories. Façade pattern sits on the top of group of subsystems and allows them to communicate in a unified manner. The façade takes care of orchestration part and present more simplified interface to the client.   Example: In a typical online shopping cart when a customer places any order following […]