Implementation Flaws in Authentication
Even a well-designed authentication mechanism may be highly insecure due to mistakes made in its implementation. These mistakes may lead
Read moreEven a well-designed authentication mechanism may be highly insecure due to mistakes made in its implementation. These mistakes may lead
Read moreSome applications that support self-registration allow users to specify their own username, and do not enforce a requirement that usernames
Read moreSome applications implement the facility for a privileged user of the application to impersonate other users, in order to access
Read moreApplications often implement “remember me” functions as a convenience to users, to prevent them needing to reenter their username and
Read moreLike password change functionality, mechanisms for recovering from a forgotten password situation often introduce problems that may have been avoided
Read moreSurprisingly, many web applications do not provide any way for users to change their password. However, this functionality is necessary
Read moreIf an application uses an unencrypted HTTP connection to transmit login credentials, an eavesdropper who is suitably positioned on the
Read moreActiveX controls are a much more heavyweight technology than Java applets. They are effectively native Win32 executables that, once accepted
Read moreBesides HTML forms, the other main method for capturing, validating, and submitting user data is to use a thick-client component.
Read more