Beefy Boxes and Bandwidth Generously Provided by pair Networks
Think about Loose Coupling
 
PerlMonks  

Re^4: Is your web application really secure? ("CSRF")

by tinita (Parson)
on Apr 02, 2007 at 09:27 UTC ( [id://607788]=note: print w/replies, xml ) Need Help??


in reply to Re^3: Is your web application really secure? ("CSRF")
in thread Is your web application really secure? ("CSRF")

it all depends on how secure you want the application. if you're doing online-banking i think even you are glad that usually you have a timeout of 10 minutes and you can't let windows open and expect them to work an hour later =)
  • Comment on Re^4: Is your web application really secure? ("CSRF")

Replies are listed 'Best First'.
Re^5: Is your web application really secure? ("CSRF")
by betterworld (Curate) on Apr 03, 2007 at 15:33 UTC
    Quite right. Using the approach that I described above, you can set the expiration timeout to 10 minutes and nobody will be able to waste you money online while you're absent. But the point is, that when you come back, you only need to login in one browser tab, and all the other tabs work again. Regardless of the cookie expiration timeout.

    Nevertheless, if the computer is in a room where many people wander about, you should lock the screen or something like that.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://607788]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others exploiting the Monastery: (7)
As of 2024-04-24 09:00 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found