- Feature Articles
- CodeSOD
- Error'd
-
Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
But why? And by what law?
I mean, I understand ignoring robots and crawlers and stuff; that's just common sense.
But exactly what law mandates you to invade personal privacy when there's a Big Ole Warning Sign outside saying "Chien Mechant! Chatte Lunatique!"
May your idiot bosses be infested with bot flies. (Yes, I'm aware that the suggestion is slightly Alanis Morrisette^W^W ironic.)
Admin
DON'T use headers to secure your web application.
Just don't.
Admin
Well, actually the correct answer is "never delete stuff from your server on a GET request, only on a POST request, and even then only after checking the user has the permission to delete stuff". Everything else is just fixing potholes.
Admin
usually you also put a die() below your header() call, to be sure the script is really stopped.
Admin
Yeah, server stored session variables that delete after authentication of action authorization are just too hard as well.
Admin
Wouldn't you usually tell robots/crawlers NOT to index a CMS page anyway? AND throw them into a honeypot if they try? On top of that wouldn't you design a CMS not to be accessible by ips other than those previously input into a db anyhow?
Admin
Beautiful