From time to time, the website needs to be in maintenance mode to perform some actions (with the database and with code). In such cases, I use a simple redirect…
Category: Web Development
In order to secure assets such as scripts, styles, media on the site, the Content-Security-Policy header is used. It is handy to mitigate data injection attacks and XSS attacks among…
Why such a code? I’m displaying the history of the database record – in a table, each row is a separate record of the history. The highest row contains current…
Some of our old CMS systems are returning 403 and 404 codes when the site is attacked with various payloads. The application firewall responds on a deeper level (the application…
During the last few days, you might experience the issue while connecting to WordPress API. The error looks somehow like this: This issue is caused by the expired Let’s Encrypt…
Some of the websites we are taking care of are old. By old, I mean the websites written over ten years ago. It is not easy to migrate them to…
We are using SOLR to search pages and documents on some of our client’s websites. SOLR contains the module that is crawling sites and places the website’s contents in the…
Keap (formerly Infusionsoft) offers a powerful Rest API. I’m working with it to keep one of our client’s Keap contacts in sync with the data stored in the web application…
reCAPTCHA is one of the most popular solutions when it comes to securing forms on websites. You may like it or not, but it is widespread and well-known to the…
It looks like now we have a series of articles related to image upload and processing – starting from “Preview image before uploading” through “Resize an image using canvas” to…