Conclusion


Hopefully you have learnt a lot about security over the course of this tutorial. Making your websites and applications secure requires a security concious mindset during development. This requires thinking outside the box and like an attacker, trying to find the ways around your application design. This tutorial is just a starting point and there are many great resources out there for learning more about security, with more resources being created all the time as it becomes a bigger issue on the web.

References


AWS, A. (n.d.), ‘Amazon ec2 instance types’.
URL: http://aws.amazon.com/ec2/instance-types/
Bevand, M. (2010), ‘Whitepixel breaks 28.6 billion password/sec’.
URL: http://blog.zorinaq.com/
Burnett, M. (2011), ‘More top worst passwords’.
URL: http://xato.net/security/passwords
Foundation, T. A. (2011), ‘Security tips’.
URL: http://httpd.apache.org/docs/2.0/misc/security_tips.html
Letzing, J. (2011), ‘Facebook flaw exposes its ceo’.
URL: http://online.wsj.com/article/SB10001424052970204083204577082732651078156.html?mod=googlenews_wsj
P, M. (2011), ‘How to update to metasploit 4 and use autopwn in backtrack 5’.
URL: http://greyhat-security.com/how-update-metasploit-4-and-use-autopwn-backtrack-5
PHP Developers (2011), ‘Php: Security - manual’.
URL: http://php.net/manual/en/security.php
Pullicino, J. (2011), ‘Preventing xss attacks’.
URL: http://www.acunetix.com/blog/web-security-zone/articles/preventing-xss-attacks/
Ristic, I. (2005), Apache Security, O’Reilly Media. Rodriguez Valderrama, J. (2011), ‘cool-php-captcha’.
URL: http://code.google.com/p/cool-php-captcha/
Shiflett, C. (2005), Essential PHP Security, O’Reilly Media.
Stuart, K. & Arthur, C. (2011), ‘Playstation network hack: why it took sony seven days to tell the world’.
URL: http://www.guardian.co.uk/technology/gamesblog/2011/apr/27/playstation-network-hack-sony