Apparently, the vulnerability reported in the handling of Javascript in firefox is a hoax. See
Tuesday, October 03, 2006
Subscribe to:
Post Comments (Atom)
Popular Posts
-
This post will describe how to create and deploy a Java Web Application war to Heroku using Heroku CLI. You will need a basic understanding ...
-
In this post we will see how to do an offline install Jenkins and required plugins on a Red Hat Enterprise Linux Server release 7.3. This is...
-
Update: A new post for validation in struts with annotation is available at: Struts 2 Validation: Annotations . Struts 2.0 relies on a val...
-
Some programming languages provide the feature of dispatching a funtion call to different concrete functions depending on the runtime types ...
-
The previous post described the Strategy pattern in brief. I listed out where and why the strategy pattern may be used. This post describes...
-
Google has opensourced it's Google Web Toolkit . The project is now fully opensource under the Apache 2.0 license . The new 1.3 RC has...
-
In a previous post, I described how to use Quartz scheduler for scheduling . In this post, I describe the configuration changes required for...
-
The Visitor design pattern provides a way to separate algorithms from the object structure. A consequence of this separation is the ability ...
-
The Command pattern is probably the most used design pattern. In command pattern, objects are used to represent actions. This allows you to ...
-
In the previous post, I described different ways in which spring and hibernate can be integrated. In this post I will describe how to use Sp...
No comments:
Post a Comment