When using Drupal for a web application, one may experience the dreaded White Screen of Death (WSOD). The WSOD has been extensively documented by the Drupal community at http://drupal.org/node/158043.

Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network.

Introduction

SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands (OWASP, 2012). SQL injection attacks pose a serious security threat to Web applications: they allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these databases contain (Halfond, Viegas, & Alessandro , 2006).

I have recently started a course on Database Security and had some difficulties in deciding whether to use MySQL or Oracle as the Database system for lab assignments. I got into the MySQL vs. Oracle debate that has been going on since before the web started. As you might imagine, the reasons to use either database over the other can fill entire books, so I tried to compare them based on their main feature sets.

Well, I have been in a Dilemma about this for a while. After reading several posts on Singular vs Plural Database table names, I finally concluded that both have its advantages and disadvantages, and that everyone has their own opinion on this, and that the most important thing is that your naming conventions are consistent across the database since it would be annoying to remember which table names are plural and which are singular.

There are several types of secondary storage media used today in the world, each of these can be compared to each other in terms of portability, speed and capacity. Here are discussions on some Secondary Storage Devices:

A friend of mine logged into her account yesterday after 2 weeks of being off facebook, and was devastated to see that she had shared pornographic images with friends and family; I had a good laugh about it, but she was madd...

This is a tutorial that demonstrates just how simple it is to get access to facebook accounts without the user's password or username. This tutorial demonstrates Session Hijacking (discussed here: http://www.cleverlogic.net/tutorials/session-hijacking-0). This is a simple attack done on an unsecured wifi network with the permission of all users on the network.

The aims of this tutorial are: