Showing posts with label Web Development. Show all posts
Showing posts with label Web Development. Show all posts
Thursday, January 5, 2012
Tuesday, September 20, 2011
To Cache or Not to Cache That is the Question?? Memcached
Memcached is a technology that uses the HEAP stack to access data more quickly than disk I/O in a traditional MySQL database. This functionality is built into the enterprise edition of the MySQL Server.
In a Memcached Client, the tables that are most frequently used in a highly utilized database are inserted into memory of the Memcached Server where they are stored and queried from by the application layer. This is useful where the application is in high demand and data is considered a necessity for the user-base and performance is key to retaining users.
Financially Feasible
From a technical stand point, one can see that this technology would be a memory hog. However, that is an added benefit when considering performance and finances. Since it uses memory for speed, you could have one or more budget server(s) to handle your cached system. The CPU and HD is in less of a demand for Memcached to be enabled than a traditional database.
In a Memcached Client, the tables that are most frequently used in a highly utilized database are inserted into memory of the Memcached Server where they are stored and queried from by the application layer. This is useful where the application is in high demand and data is considered a necessity for the user-base and performance is key to retaining users.
Financially Feasible
From a technical stand point, one can see that this technology would be a memory hog. However, that is an added benefit when considering performance and finances. Since it uses memory for speed, you could have one or more budget server(s) to handle your cached system. The CPU and HD is in less of a demand for Memcached to be enabled than a traditional database.
Monday, September 12, 2011
A Cryptic Approach To Cryptography
Its been a while since my last post. Ive got two posts sitting in my draft since February. I'm a little behind on I thought I would give some advice about Cryptography.
Scenario
Lets say that you have a list of passwords and usernames stored in a db generated from your web/intranet app. If your like me, you only want the best in security for your users. So you go shopping for encryption technology.
Scenario
Lets say that you have a list of passwords and usernames stored in a db generated from your web/intranet app. If your like me, you only want the best in security for your users. So you go shopping for encryption technology.
Friday, December 10, 2010
Video Example: 6-minute jQuery Jumpstart with the slideUp effect - Marakana
Saturday, May 22, 2010
MySQL MATCH AGAINST Query ERROR 1191
I came across this problem when I ran into a client who needed Boolean search functionality on his site. The previous query he had was using LIKEs to do the searching on 6 columns. I told him about using a new query that used FULLTEXT indexes and continued about the performance benefits and also overhead this might cause as their data changes overtime. Naturally, I gave him a cronjobs script that basically optimizes the table to help him with maintenance. The problem arose when I implemented the query (Match..Against) I kept on getting:
ERROR 1911 (HY000): Can't find FULLTEXT index matching the column list.
Labels:
Bug,
Database,
MySQL,
Performance,
Web Development
Monday, March 1, 2010
Validating by White List approval
White listing refers to having input compared to an approved list and then rejecting what ever isn't on it. Like when you go to a concert and you are trying to get backstage, if you're name isn't on the VIP list or you don't have a pass you cant get in. In this instance, your name is compared to the list of valid people allowed backstage. If your name doesn't appear you tossed aside. Sucks right but when your talking about building a web app it can be one of the methods that separate you from being attacked.
Wednesday, February 17, 2010
PHP Protection from XSS attacks
If you have a forum, or blog hosted on your site. Then you should be aware of cross site scripting vulnerabilities that any basic HTML form can produce. I will show you how the vulnerability exists, how to detect it, and how to mitigate this form of attack.
What is an Cross-Site Scripting (XSS) Attack?
Cross site scripting vulnerabilities are produced when a web site displays unfiltered user generated input on to the site. By allowing users to supply their own content, hackers can figure out ways to get malicious content on the website by injecting it with their own scripts via javascript and change the
What is an Cross-Site Scripting (XSS) Attack?
Cross site scripting vulnerabilities are produced when a web site displays unfiltered user generated input on to the site. By allowing users to supply their own content, hackers can figure out ways to get malicious content on the website by injecting it with their own scripts via javascript and change the
Subscribe to:
Posts (Atom)