Explore >> Select a destination


You are here

www.matthewhoelter.com
| | blog.elmah.io
3.9 parsecs away

Travel
| | Learn how to configure Cross-site request forgery (CSRF) checks when using AJAX with jQuery or similar in an ASP.NET Core web application.
| | ryanfb.xyz
0.6 parsecs away

Travel
| | If you're using Webpacker with Rails 6, you may have run into an issue trying to use jQuery in JavaScript from a global context. Usually this will show up in the console as something like "$ is not defined," particularly if you're trying to use jQuery from your *.js.erb views for SJR (Server-generated JavaScript Responses) for AJAX.
| | www.miguelxpn.com
3.6 parsecs away

Travel
| | XSS stands for Cross Site Scripting, it's basically when input is not properly sanitized somewhere and a malicious actor can inject unintended javascript somewhere. That javascript will be executed by some unsuspecting user's browser and then bad stuff can happen.
| | ionutbalosin.com
17.7 parsecs away

Travel
| [AI summary] The provided text is a comprehensive guide on implementing security measures in Java applications, focusing on authentication, authorization, and various HTTP security headers. It covers topics such as API security, token introspection, JSON Web Key Set (JWKS), Content Security Policy (CSP), Cross-Origin Resource Sharing (CORS), HTTP Strict Transport Security (HSTS), and other security headers like X-XSS-Protection, X-Frame-Options, X-Content-Type-Options, and Referrer-Policy. The guide includes code snippets for configuring these security measures in a Java application and emphasizes the importance of using these headers to mitigate common web vulnerabilities and enhance application security.