Web Client and Web Server approaches to Prevent XSS Attacks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
Websites rely completely on complex web applications to deliver content to all users according to set preferences and specific needs. In this manner organizations provide better value to their customers and prospects. Dynamic websites suffer from various vulnerabilities rendering organizations helpless and prone to cross site scripting attacks. Cross Site Scripting attacks are difficult to detect because they are executed as a background process. Cross Site Scripting is the most common web vulnerabilities in existence today which is most exploited issue .In this paper we have presented various approaches used by clients and Server to prevent XSS attacks
Authors and Affiliations
Jyoti Snehi, Dr. Renu Dhir
Factors influencing motivation level of academic staff in Education of IBA Community College Khairpur Mir's
To investigate the degree to which various factors influence motivation level of academic staff of IBA Community College Khairpur Mir's. The study has utilized a questionnaire survey. Participants were 40 (24 male, 16 fe...
A Difference Scheme Using Spline for a Class of Singular Boundary Value Problem
In this paper, a finite difference scheme using cubic splines has been discussed to find the numerical solution for a class of singular two point boundary value problems for certain ordinary differential equations. The c...
An Algorithm to reduce End to End Delay AND Enhance the Quality of Service in Mobile Adhoc Network
A mobile adhoc network (MANET) is formed by a group of wireless mobile hosts or nodes without any fixed infrastructure. As there is no inner control in a MANET, a mobile node itself acts as a router. Undoubtedly, MANETs...
REVIEW OF DATABASE AND PROMINENT PROGRAMMES
Databases and database systems have become an essential component of everyday life in modern society. In the course of a day, most of us encounter several activities that involve some interaction with a database. For exa...
Implementation of the Basic System in the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. This is because the TCP/IP protocol use...