OWASP & The Top 10

The OWASP Top 10 details critical risks associated with web application security and is the defacto standard for web app security.

The Dark Side of Cookies

Browser cookies are files stored on your computer with information to be used by your web browsers. They aren’t evil on their own, but they can be used for evil.

Why I Went “All In” for InfoSec

Last May I quit my job as a web developer, went back to college and started racking up GIAC certifications. Since then I have overclocked my brain, blown my buffers, and melted my cortex more times than I can count, and I love it.

SEO 101: Love Your Body

Now that we’ve explored how you can use your HEAD content to improve search engine listings, let’s move along to the BODY portion of your HTML code. Even if you…

SEO 101: Use Your HEAD, Part V: Meta Description

Like the TITLE tag, the META Description tag was once looked upon as an afterthought, something you played around with when you had nothing better to do with your time.…

SEO 101: Use Your HEAD, Part IV: Meta Keywords

In the strange and confusing world of META tags, there are two that every online marketer knows about, even if what they think they know is wrong. The two tags…

SEO 101: Use Your HEAD, Part III: Meta Tags and HTTP

Sorry for the delay on this installment. Things got kinda busy after New Years…  😉 Last time around we established that META tags are how we add extra, non-essential information…

SEO 101: Use Your HEAD, Part II: Meta Tags and Metadata

In my last post we took a look at some HTML source code and started exploring ways to optimize the HEAD content of your web pages. So far we’ve only…