Difference between revisions of "Category:OWASP Web 2.0 Project"

From OWASP
Jump to: navigation, search
m
Line 6: Line 6:
  
 
* [http://www.gnucitizen.org/blog/the-top-5-most-popular-web20-services-hackers-cannot-live-without The Top 5 most Popular Web2.0 Services Hackers Cannot live Without]
 
* [http://www.gnucitizen.org/blog/the-top-5-most-popular-web20-services-hackers-cannot-live-without The Top 5 most Popular Web2.0 Services Hackers Cannot live Without]
 +
* [http://www.owasp.org/index.php/OWASP_Papers/Jeopardy_in_Web_2_0 Top 6 Security Concerns in Web 2.0]
 
* [http://www.gnucitizen.org/blog/ad-jacking-xssing-for-fun-and-profit Ad-Jacking - XSSing for Fun and Profit]
 
* [http://www.gnucitizen.org/blog/ad-jacking-xssing-for-fun-and-profit Ad-Jacking - XSSing for Fun and Profit]
 
* [http://www.gnucitizen.org/blog/xss-worms-and-mitigation-controls XSS Worms and Mitigation Controls]
 
* [http://www.gnucitizen.org/blog/xss-worms-and-mitigation-controls XSS Worms and Mitigation Controls]

Revision as of 06:16, 6 July 2007

Welcome to the OWASP Web2.0 Project page. In this part of OWASP, we are going to talk about Web2.0 security and in general cutting-edge web application hacking. Before going any further it is essential to describe what Web2.0 is.

Web2.0, as some people say, is when the content is generated by the user/group while the site revenue is consumed by the vendor. However, Web2.0 is about integration. This subject largely involves all types of technologies such as XML, XSLT, Feeds, JavaScript, Server side scripts, RIA, etc.

The project is currently at alpha stage but it will expand soon. While we are working on OWASP Web2.0 Project pages, check the following articles for further reference.

Expect more links to follow.

This page was put together within 2 minutes. Please bear with us, we will come back with more content soon.

This category currently contains no pages or media.