Tag

input validation

1 views collected around this technical thread.

macrozheng
macrozheng
Jun 6, 2025 · Backend Development

Why “null” Strings Break Your Java Backend – and How to Fix It

The article explains how treating the literal string "null" as an empty value can cause serious bugs in Java backend registration, demonstrates the issue with code examples, and provides practical input‑sanitizing and validation techniques to prevent such errors and related security risks.

JavaNull HandlingSecurity
0 likes · 7 min read
Why “null” Strings Break Your Java Backend – and How to Fix It
php中文网 Courses
php中文网 Courses
May 28, 2025 · Information Security

Understanding XSS Attacks and Prevention Methods in PHP

Cross‑Site Scripting (XSS) is a common web security vulnerability where malicious scripts are injected into pages, and this article explains typical PHP XSS scenarios, demonstrates code examples, and outlines effective mitigation techniques such as htmlspecialchars(), HTML Purifier, proper headers, secure cookies, CSP, and best practices.

Content Security PolicyPHPWeb Security
0 likes · 5 min read
Understanding XSS Attacks and Prevention Methods in PHP
php中文网 Courses
php中文网 Courses
Feb 13, 2025 · Information Security

Comprehensive PHP Security Best Practices: Dependency Management, Session Hardening, CSRF Protection, Input Validation, Type Declarations, Prepared Statements, Error Handling, and Security Testing

This article presents a thorough guide to securing PHP applications by managing Composer dependencies, hardening session handling, implementing CSRF defenses, sanitizing all inputs, enforcing strict type declarations, using prepared statements for database access, concealing sensitive error details, encapsulating critical operations, and incorporating security‑focused testing.

CSRFPHPSecurity
0 likes · 16 min read
Comprehensive PHP Security Best Practices: Dependency Management, Session Hardening, CSRF Protection, Input Validation, Type Declarations, Prepared Statements, Error Handling, and Security Testing
php中文网 Courses
php中文网 Courses
Jan 27, 2025 · Information Security

How to Prevent SQL Injection in PHP Applications

This article explains essential techniques to protect PHP applications from SQL injection attacks, covering prepared statements, input validation, ORM usage, escaping, stored procedures, permission restrictions, web application firewalls, and logging, with practical code examples for PDO, MySQLi, and Eloquent.

ORMPHPSQL injection
0 likes · 5 min read
How to Prevent SQL Injection in PHP Applications
Code Mala Tang
Code Mala Tang
Dec 16, 2024 · Information Security

Avoid These 9 Common Node.js Security Pitfalls and Harden Your Apps

This guide reveals nine frequent security mistakes in Node.js applications—from misconfigured CORS and vulnerable dependencies to weak authentication and missing HTTPS—offering concrete code‑level solutions and best‑practice recommendations to protect your backend.

AuthenticationCORSNode.js
0 likes · 8 min read
Avoid These 9 Common Node.js Security Pitfalls and Harden Your Apps
JD Tech
JD Tech
Oct 9, 2024 · Fundamentals

Defensive Programming: Concepts, Core Principles, and Practical Java Examples

This article explains defensive programming as a proactive coding paradigm that anticipates and mitigates errors through input validation, error handling, assertions, and continuous testing, and demonstrates its application with detailed Java examples covering pagination, loop safety, exception management, and boundary checks.

Javadefensive programmingerror handling
0 likes · 15 min read
Defensive Programming: Concepts, Core Principles, and Practical Java Examples
php中文网 Courses
php中文网 Courses
Aug 1, 2024 · Information Security

Common PHP Pitfalls and Effective Prevention Strategies

This article examines frequent security and quality pitfalls in PHP development—such as deprecated functions, SQL injection, XSS, insecure file inclusion, poor error handling, session hijacking, hard‑coded credentials, insufficient input validation, outdated versions, and low code quality—and provides concrete best‑practice recommendations to avoid them.

PHPSecurityWeb Development
0 likes · 8 min read
Common PHP Pitfalls and Effective Prevention Strategies
360 Smart Cloud
360 Smart Cloud
Jul 11, 2024 · Information Security

Web Security Fundamentals: Secure Coding, SQL Injection, XSS, and File Management

This article provides a comprehensive overview of web security, covering authentication, input validation, secure coding practices, SQL injection and XSS attack mechanisms, detection methods, defensive techniques, and best practices for secure file upload and download.

File UploadSQL injectionSecure Coding
0 likes · 15 min read
Web Security Fundamentals: Secure Coding, SQL Injection, XSS, and File Management
php中文网 Courses
php中文网 Courses
Jul 1, 2024 · Information Security

PHP Security Best Practices: Protecting Applications from Common Vulnerabilities

This article explains why PHP security is critical and outlines five common PHP vulnerabilities—SQL injection, XSS, CSRF, remote code execution, and file inclusion—along with comprehensive best‑practice recommendations such as input validation, secure password storage, session management, error handling, and continuous learning.

PHPSecurityWeb Development
0 likes · 18 min read
PHP Security Best Practices: Protecting Applications from Common Vulnerabilities
Test Development Learning Exchange
Test Development Learning Exchange
Jun 15, 2024 · Fundamentals

Understanding Python's callable() Function: A Comprehensive Guide

This article explores Python's callable() function, explaining its purpose, principles, and practical applications through detailed code examples, helping readers master this essential tool for understanding Python's object-oriented and functional programming features.

Functional Programmingcallable functioncallback functions
0 likes · 4 min read
Understanding Python's callable() Function: A Comprehensive Guide
php中文网 Courses
php中文网 Courses
Jan 29, 2024 · Information Security

Guide to Preventing LDAP and SQL Injection Attacks in PHP

This article explains the principles, provides code examples, and outlines preventive measures for LDAP and SQL injection attacks in PHP, helping developers understand how these vulnerabilities work and how to secure their web applications through input validation, parameter binding, and access control.

LDAP injectionPHP securitySQL injection
0 likes · 6 min read
Guide to Preventing LDAP and SQL Injection Attacks in PHP
Laravel Tech Community
Laravel Tech Community
Oct 23, 2023 · Information Security

Implementing Signature and Rate‑Limiting Mechanisms for Secure PHP APIs

This article explains how to secure PHP APIs by implementing a signature mechanism and rate‑limiting using Redis, and also outlines additional protections such as HTTPS, access control, input validation, logging, and security audits.

API securityHTTPSPHP
0 likes · 6 min read
Implementing Signature and Rate‑Limiting Mechanisms for Secure PHP APIs
php中文网 Courses
php中文网 Courses
Aug 11, 2023 · Information Security

PHP Code Security Testing: Review, Tools, and Practices

This article explains how to secure PHP web applications by performing code reviews, validating user input, preventing SQL injection and XSS, and using security testing tools such as PHP Security Scanner, OWASP ZAP, and Kali Linux, along with practical testing methods like boundary, authorization, and exception handling.

Code ReviewPHPSQL injection
0 likes · 5 min read
PHP Code Security Testing: Review, Tools, and Practices
php中文网 Courses
php中文网 Courses
Aug 7, 2023 · Information Security

Essential PHP Security Practices: Input Validation, XSS Prevention, SQL Injection Defense, and Session Protection

This article outlines key PHP security techniques—including input validation, dangerous character filtering, XSS mitigation, HttpOnly cookies, prepared statements, and session hardening—providing code examples to help developers safeguard their web applications against common attacks.

SQL injectionSession ManagementXSS
0 likes · 5 min read
Essential PHP Security Practices: Input Validation, XSS Prevention, SQL Injection Defense, and Session Protection
php中文网 Courses
php中文网 Courses
Jul 5, 2023 · Information Security

Using PHP Security Library Functions to Prevent Code Injection Attacks

This article introduces PHP security library functions such as htmlspecialchars(), htmlentities(), and mysqli_real_escape_string(), demonstrating with code examples how they filter and validate user input to prevent XSS and SQL injection attacks, while noting that additional security measures are still required.

SQL injectionSecurityWeb Security
0 likes · 4 min read
Using PHP Security Library Functions to Prevent Code Injection Attacks
Sohu Tech Products
Sohu Tech Products
Nov 2, 2022 · Information Security

Handling XSS Vulnerabilities in Spring Boot: Request Wrapper, Filters, and Jackson Custom Serialization

This article documents a step‑by‑step solution for preventing XSS attacks in a Spring Boot application, covering input validation, a custom HttpServletRequestWrapper, filter registration, and Jackson serializers/deserializers to escape malicious HTML both on request parameters and JSON payloads.

FilterJacksonRequestWrapper
0 likes · 16 min read
Handling XSS Vulnerabilities in Spring Boot: Request Wrapper, Filters, and Jackson Custom Serialization
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 20, 2022 · Frontend Development

Improving Form User Experience in Flutter: Error Tips, Labels, Keyboard Types, and Validation

This article explains how to enhance form usability in Flutter by using appropriate error prompts, label styles, keyboard configurations, and validation rules, providing practical code examples and best‑practice recommendations for building consistent, user‑friendly form components in mobile applications.

FlutterForm UXMobile UI
0 likes · 10 min read
Improving Form User Experience in Flutter: Error Tips, Labels, Keyboard Types, and Validation