As I understand it, users will have the Christmas period to move their entire backlog of email messages, and notify all senders of emails of a change of address. Come January 14 2011 all emails to that address will be bounced.
If, like us and most of the online community, you have decided to join the odd mailing list or two, you would need to track them ALL down and amend them. However, how do you deal with accounts that don’t allow you to change the prime email address?
Switching at such short notice is not going to be a quick or easy task. One of the reasons we use several email identities is to avoid this type of situation, so here’s hoping none of our independant service providers go the same way!
The recent attack on the Royal Navy site using SQL Injection techniques is a timely reminder to anyone still leaving their database unprotected.
The good news is you can quite easily reduce the risk of an injection attack. They take place when a site allows data input fields on a form access to basic SQL commands. By adding extra words to the end of a form input field SQL statements can be run in addition to the original designed statement. These commands can be quite simple for example, firstly select a list of tables, then select the data in the tables. As this operates at the database layer a connection has already been made by the software to the database so login details aren’t required.
There are simple functions that use basic escape mechanisms to protect the data input. The most common is escaping the data, which may not be the strongest security measure. The input string is read and if the function finds certain characters it will ‘escape’ or add a ‘\’ character in front of the relevant character. There are still ways around this so to be safe the query to the database should be ‘parameterized’ that is the input string is broken up and selected parts are passed to the SQL query. Basic functions exist in most programming languages to do this task.
Better yet, and good practice anyway, is to use stored procedures as these are totally parameterized. It isn’t particularly complicated, but it is a bit of a pain to do … if in doubt ask your web designer!
Why do certain harmless objects cause such stress?
I personally think that printers are the most likely source of ‘object rage’ that I can think of and this following clip – which contains VERY STRONG – not for the faint-hearted - language seems to agree -
It sums it all up for me. I must spend hours a day talking to screens, printers and various network boxes, all to no avail as if somehow, by giving them a life and personality, they will actually work better.
Basil never had this problem, he just lashed everything with branches – not a bad idea at that.