From 29d40192ed3dc0085b5e513ec071c81e03e95d3b Mon Sep 17 00:00:00 2001 From: xue <> Date: Thu, 23 Mar 2006 13:25:09 +0000 Subject: Reorganized quickstart tutorial. --- demos/quickstart/protected/pages/Security/XSS.page | 13 ------------- 1 file changed, 13 deletions(-) delete mode 100644 demos/quickstart/protected/pages/Security/XSS.page (limited to 'demos/quickstart/protected/pages/Security/XSS.page') diff --git a/demos/quickstart/protected/pages/Security/XSS.page b/demos/quickstart/protected/pages/Security/XSS.page deleted file mode 100644 index fedd2a38..00000000 --- a/demos/quickstart/protected/pages/Security/XSS.page +++ /dev/null @@ -1,13 +0,0 @@ - - -

Cross Site Scripting Prevention

-

-Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. Often attackers will inject JavaScript, VBScript, ActiveX, HTML, or Flash into a vulnerable application to fool other application users and gather data from them. For example, a poorly design forum system may display user input in forum posts without any checking. An attacker can then inject a piece of malicious JavaScript code into a post so that when other users read this post, the JavaScript runs unexpectedly on their computers. -

-

-One of the most important measures to prevent XSS attacks is to check user input before displaying them. One can do HTML-encoding with the user input to achieve this goal. However, in some situations, HTML-encoding may not be preferrable because it disables all HTML tags. -

-

-PRADO incorporates the work of SafeHTML and provides developers with a useful component called TSafeHtml. By enclosing content within a TSafeHtml component tag, the enclosed content are ensured to be safe to end users. In addition, the commonly used TTextBox has a SafeText property which contains user input that are ensured to be safe if displayed directly to end users. -

-
\ No newline at end of file -- cgit v1.2.3