Chapter 22: JavaScript security

JavaScript continues to find adherents. But this scripting language can be used by malicious hacks to eat up memory .. and worse. Learn about Java script security now.

JavaScript continues to find adherents. Some of them are not dedicated to better IT practices. JavaScript adherents over the years have come to include nefarious hackers and other vandals, and, as a result, the JavaScript security model has had to evolve in order to better protect programs that run businesses.

The browser-as-ubiquitous client has its good and bad aspects, and many of them have an impact on use of JavaScript. The popular scripting language is a ready means to spawn functions and add useful capabilities. But this same language can be used to eat up memory. Worse, this can lead to crashes of either or both the browser and operating system.

In this chapter from JavaScript: The Complete Reference, Second Edition, by Thomas Powell and Fritz Schneider, you will learn about:

  • Data validation
  • Cross site scripting vulnerabilities
  • Sandbox approaches that restrict script execution environments
  • The signed script policy
  • Different behaviors of different browsers
  • Intranet versus Internet browser security strategies

    Click here to download this free book chapter.


  • This was first published in November 2004

    Dig deeper on JavaScript for Lotus Notes Domino

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchWinIT

    Search400

    • iSeries tutorials

      Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

    • V6R1 upgrade planning checklist

      When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

    • Connecting multiple iSeries systems through DDM

      Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

    SearchEnterpriseLinux

    SearchVirtualDataCentre.co.UK

    Close