Archive | September 2014

Website Developer.. Front and back end

A website developer is someone who can build, design and maintain website applications which run over HTTP from a web server to a web browser.  Web developers are usually split up into front end and back end; front end typically being more focused on the appearance and design of the website as opposed to the back end which focuses on things like data storage, calculations and business logic, all required for the site to function efficiently.

Technologies used 

Front end web developers code using HTML, CSS and JavaScript. Hyper Text Markup Language or HTTP as its more commonly referred to is the basic format for the scripting language that’s used to create a website application; it is the code web browsers use and display information to users.  CSS (Cascading Style Sheets) is a style sheet language which is used to detail the design of a page in order to allow multiple pages to share the same formatting, effectively creating a template. CSS allows web developers to improve the presentation of the website by adding paint, buttons, lights and many other style options. Finally we have JavaScript which is a programming language designed for adding dynamic content, consequently increasing user interactivity.

Back end web developers typically use languages such as Ruby, Python and SQL.  Ruby is used to code business logic, calculate data and share servers. Ruby was created to be efficient and user friendly and some developers believe it to be fun to code using this language.  Python, much like Ruby is widely known for its readability and is used for the same purposes.  SQL is a database language which primary function is to interact with databases. Most web applications will use SQL or an abstraction of it despite the language or framework chosen.

http://en.wikipedia.org/wiki/Web_development

Front-End vs. Back-End: The Complete Guide

http://www.ehow.com/info_12138170_difference-between-front-end-back-end.html

Mobile Phone vulnerabilities

As technology continually advances and we become more and more reliant upon our gadgets and devices there has also been a rise in people wishing to exploit this fact.  We now have the technology available to allow us to speak to and even see people across the globe, access our bank accounts, check weather forecasts for the weekend, listen to our favorite songs, the list goes on.  All this can be done from one device which can fit comfortably into your pocket.  Yes, i’m talking about mobile phones.  We trust these little devices with all our private information from bank details to important passwords but how secure are they?

The first security issue regarding mobile phones is that wireless transmissions are not always encrypted.  This can leave information sent via email vulnerable to interception.  In addition, many applications also don’t encrypt transmitted data, again, leaving it open for anyone to intercept.  This can be worrying as some information sent can be classed as sensitive. Another issue is that users may be getting more than expected when they innocently download applications.  In some cases malware can also be downloaded along with the app or update.  Unfortunately it is very difficult to distinguish between an app that is genuine or one which is malware in disguise.  Most mobile devices don’t come with built in security software. This leaves them vulnerable to spyware, malware and an malicious applications.  Security software is available to download on devices which require it, however, most users are reluctant to use it as it slows down operations and decreases battery life.  Operating systems and software can also be out of date.  There is usually more than one party involved when releasing updates; google will fix android security issues yet it will be up to the manufacturer of the device to provide an update which will contain the patch, the carrier will then need to test it in order to ensure there are no software conflicts.  This process can be time consuming and can leave the users vulnerable for longer.  After 18 – 24 months manufacturers typically abandon new patches which will leave new vulnerabilities open to exploitation effectively without a time frame.  Mobile phones don’t always come with firewalls. This means they don’t limit internet connections, leaving communication ports unsecured and open to hackers.  Hackers may be able to access sensitive information through these ports without the knowledge or consent of the user.  This risk isn’t actually associated with the device itself, but instead, an unsecured WiFi network the device connects to.  Many public WiFi zones aren’t properly secure and can lead to data and identity theft.  Users will happily connect to the WiFi zones and unknowingly have a middle man intercepting information from the communication between devices.

So, what can we do to protect ourselves from the seemingly endless amount of threats associated with mobile devices.  Firstly we must ensure the device is protected with passwords, they will provide a basic level of security which will prevent thief’s from accessing the device.  It is not uncommon for people to loose their phones and if online banking and sensitive information is stored on the device the finder may have no problem accessing them.  You should always use a secure internet connection when sending data, home networks should be used over public WiFi hot spots.  Change your passwords frequently and make sure they contain uppercase, lowercase and numbers. Always download apps from trustworthy sources; many people jailbreak their phones now using alternative app stores which have a higher risk of fake apps.  Another way to check it the app is legitimate is to read the reviews and ratings; you will get feedback and will be able to make a better call on whether or not the app is trustworthy.  If an app doesn’t have any reviews or ratings maybe you should reconsider downloading and installing it onto your device. 

http://www.pcworld.com/article/2010278/10-common-mobile-security-problems-to-attack.html