programming4us
programming4us
WEBSITE

Web Design: Where To Start (Part 5)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

If you’ve been working mostly in print, chances are security hasn’t been at the forefront of your mind. But as soon as you venture online, that has to change. If you’re lucky, none of the sites you work on will ever be hacked; but then if you’re lucky, you’ve probably won the lottery and instead of reading MacUser are at this moment rolling around on a pile of fifty-pound notes, just because.

Description: Secure your site

Secure your site

First and foremost, sort your passwords out. Wherever you use passwords to get into the systems you use online – FTP, databases, social networks and other services linked through to sites–make sure the passwords are always strong and unique. Avoid using the same password, or even a variation on one, for multiple accounts or services. Follow the advice at accounts.google.com/PasswordHelp.

If you’re working for a client who’s used ‘password’ for their FTP password, or routinely creates employee logins consisting of ‘firstname_surname’ with the password set to ‘surname1’, encourage them to change their ways. Where possible, change passwords every few months –this helps to avoid ex-staff logging in for the lulz after a few too many beers, among other benefits.

Keep an eye on both remote and local files to see if anything has a suspicious modification date. This can be a sign of a hacked file, a common tactic being to ‘inject’ scripts that write hidden spam links into a web page. Spotting a dodgy date is easier than spotting small changes in a mountain of content files.

Sites that allow customers or other members of the public to create their own logins, which will then give access to their personal accounts and information, need to take serious care to comply with data protection rules and best practice to avoid the risk of large fines. Using of-the-shelf services with suitable security features can take some of the weight of you, but read up and make sure you understand what you’re doing. Don’t hesitate to take professional advice if this isn’t your area.

Where online systems can provide backups and exports, ideally on an automated basis, take advantage. Many web hosts are offering increasingly sophisticated services in this area. Be clear what you’re getting: don’t confuse redundancy with backup, for example. At worst, or as a backstop, back up your server manually every week. Plug-ins such as AntiVirus, Block Bad Queries, Login LockDown, Secure WordPress and WordPress File Monitor can help to protect WordPress installations, and other platforms may have their own equivalents.

Description: Block Bad Queries

Block Bad Queries

Finally, some sites try to secure page content–blocking text copying, for example, or right-clicking to download images. Don’t do this unless you want users to hate you. It screws up their experience and won’t stop plagiarists or pirates.

Test across browsers

The web has always been a moving target. Browsers and related standards evolve at a blistering pace, as do the devices they run on. Time was you merely had to check that a site worked in a couple of resolutions on a Windows PC and give a cursory glance to it on a Mac. Today, there are 27in desktop monitors, a plethora of laptops, tiny MacBook Air-inspired Ultrabooks, the iPads – and that’s before you consider phones. In terms of traffic, smartphones make up a fifth of the market in the US and 40% in China.

This rapidly shifting landscape should tell you three things. First, you need to aim to design in a manner that’s flexible; second, the day of the one-size-fits-all pixel-perfect design is gone; and third, unless you test your site across arrange of browsers, chances are it’ll fail in some, making you (or your client) look a mug.

Description: Unless you test your site across arrange of browsers, chances are it’ll fail in some, making you (or your client) look a mug.

Unless you test your site across arrange of browsers, chances are it’ll fail in some, making you (or your client) look a mug.

In a sense, Mac users are fortunate. WebKit, the guts of Apple’s Safari browser and the power behind many a web design app’s preview window, is popular. It’s also the foundation of Google Chrome, along with stock iOS and Android browsers. But that’s not to say implementations of WebKit are identical, because they’re not. So while it’s fine to start out testing in Safari (despite its relatively low overall market share – about 7%), you should also install Chrome and test in it.

Internet Explorer, Firefox and Opera are the other major desktop browsers that warrant a look, and their engines are all different. Firefox and Opera have Mac versions, but Internet Explorer requires a PC or virtual machine (Windows on your Mac); virtual machine options include VMware Fusion, Parallels Desktop and VirtualBox. It’s also worth noting that old versions of IE cling on, and so you should test in at least two previous releases. Either install different versions of Internet Explorer into separate virtual machines, or use IE Collection (utilu.com/IECollection/). For one-off layout sanity checks, Adobe BrowserLab (browserlab.adobe.com) is sufficient, but you get no interaction.

When it comes to mobile, even pros often focus on Safari for iPhone to the exclusion of other options. It’s a good starting point, but you should also try Opera Mini, which is popular on cheaper hardware. Where possible, also test on Android. If you can afford to buy a range of devices, use Chrome on the Mac and Adobe Shadow (adobe.com/shadow) to simultaneously browse across multiple devices. Beyond browser compatibility, test edge cases: turn of images or CSS and see if what remains is usable. Where possible, try your site out on real people, to check your assumptions. And after you make the necessary changes…test again.

Other  
  •  The Download Directory - October 2012 (Part 2)
  •  The Download Directory - October 2012 (Part 1) - KeyboardLock 1.2.4295, Skip Metro Suite 1.0.0
  •  Plug-in Of the Month - November 2012 : Audacity for Windows 2.0.2 RC4, Firefox 15 Beta 5, Comment Blocker
  •  CodeKit Vs LiveReload
  •  Tracking Results and Measuring Success : Competitive and Diagnostic Search Metrics (part 7) - Temporal Link Growth Measurements
  •  Tracking Results and Measuring Success : Competitive and Diagnostic Search Metrics (part 6) - Web Traffic Comparison
  •  Tracking Results and Measuring Success : Competitive and Diagnostic Search Metrics (part 5) - Tracking the Blogosphere, Search Engine Robot Traffic Analysis
  •  Tracking Results and Measuring Success : Competitive and Diagnostic Search Metrics (part 4) - Rankings, Crawl Errors
  •  Tracking Results and Measuring Success : Competitive and Diagnostic Search Metrics (part 3) - Measuring the value of a link
  •  Tracking Results and Measuring Success : Competitive and Diagnostic Search Metrics (part 2) - Search-engine-supplied tools, Third-party link-measuring tools
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us