Development Security for Lotus Notes Domino News
August 07, 2006
Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers.
July 13, 2006
The increased use of Ajax has brought to the forefront concern about its security. Recognizing that this is an issue, the Open Web Application Security Project (OWASP) is updating its Guide to Building Secure Web Applications to include a separate ...
March 29, 2006
For many Java developers, application security has not been an issue they've wanted to address. That changed last week as a panel of application security experts tackled the subject at TheServerSide Java Symposium in Las Vegas. The panel's message ...
January 19, 2006
Top security expert Howard Schmidt has viewed IT security from nearly every angle -- from the private sector at eBay and Microsoft, where he co-founded Microsoft's Trustworthy Computer Security Strategies Group, and from the government side, where ...
Evaluate Development Security for Lotus Notes Domino Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
We've compiled our most-viewed Lotus Notes/Domino coding and development tips of 2008. Discover how to use LotusScript to sort a document selection, programmatically replace the design of a Lotus Notes database, clear a local cache using LotusScript... Continue Reading
The results are in. Here are the top 10 most-clicked Lotus Notes programming and development tips of 2007. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
Having a customizable, large dashboard would be good, however, it is very straightforward for a beginner to set up.Powered by IT Central Station
Valuable Features: Load balancing multi-WAN (High latency) Queues with CBQ algorithm Traffic shaper (limiter) Aliases for grouping anything VPN...Continue Reading
Powered by IT Central Station
I started to title this a "Review" of the Cisco ASA with FirePOWER, but my objective is to highlight a few limitations of the integrated...Continue Reading
Manage Development Security for Lotus Notes Domino
Learn to apply best practices and optimize your operations.
SearchDomino.com member Jim Mck explains how to hide your Lotus Notes database design, so no one can make design changes or copy your application's source code. Continue Reading
Problem Solve Development Security for Lotus Notes Domino Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Discover what security settings you need to fix if you encounter the Lotus Notes database error: 'database is not opened yet.' Continue Reading
Learn two Lotus Notes Domino commands you can use to verify if users have access to Web pages from within Lotus Notes. Continue Reading
How to create buttons in a Domino e-mail doclink form. Continue Reading