CSS Archive

Controlling the site

by Joeydes M

This article is about controling a web site with CSS. It talks about the old times when HTML was plain and boring content that, in the event it was altered or enhanced, had to be done on the fly and “inline”. As many of us already know this is very time comsuming and tedious. The article goes on to talk about these annoyances and how if a change is made to a particular paragraph lets say then that paragraph and that paragraph only will recieve the formating. You would have to pay attention to detail and ensure that all the paragraphs were formated the same and that they included all the say tags and formats in order for your site to be consistant and look professional. The article stresses the ease of using CSS and how if you set a specific tag to have a unique formatting, then everywhere in on the page that you used that tag that formatting will be applied. The author also makes a note of giving the reader a brief and simplistic tutorial to better drive home the point of the easiness of CSS and the effectiveness. Lastly the author addresses the down side to using CSS and that is the compatability with multiple browsers not all browsers see the CSS and interpret it the same. This is obviously problematic for a developer. read more...

CSS Cross-Origin Attacks

by Andrew N

CSS Cross-Origin Attacks


Cross-origin attacks are when an attacker inserts their scripting into an existing block of code and is able to extract private information through luring the end user to basically give them the information. They can do this through various ways such as luring you to one of their websites or send e-mails that can activate the extraction. All browsers a susceptible to such attacks. The attackers are actually very limited to what they can do. They are mainly trying to get you to make the wrong decision by luring you to click on an extraction link which is actually a site on their web server where they can request for the code block that has been compromised by their string injection. Cookies are a present threat because they store valuable information and without them attackers are helpless. Attackers are also limited by the structure and behavior of the site as well, such as, insufficient injection points, quotes, line breaks, character escapes. These have to be replicated exactly by the attacker or it will not work. Example of an attack would be Yahoo! Mail where the attacker can send mail to lure you into clicking on their site and as it loads, it also pulls from their injection strings your information. read more...

The importance of CSS

by Boshi W
Back in the days when there was no Cascade Style Sheet, web designers had 2 options: create a simple web page that contained little more than a few pictures and lists, or create an HTML and place contents within each cell of a table. Clearly, both of these lack creativity and very and is major hassle. Thankfully, CSS was soon developed and web design was no longer a tedious job. The article I read talks about the benefits of using CSS and why every developer should learn and use it if they want to create a professional looking webpage. read more...

Bring Internet to Television World

by Tuyen H

Recently, Televisions have been enhanced many new features base on the Internet standard. Television manufactories adopt web standards such as W3C and CSS to their products, so customers can customize their TV program likes a computer. This technology calls LINE Profiles. The profile includes a subset of XHTML, CSS, and ECMA Script that support more data applications for TV.  While XHTML support the TV background, CSS use to format the layout of the TV’s screen. ECMA Script includes the browser pseudo object functions such as communication using TCP/IP. In this article, the authors also list five requirements to link the TV program and LINE document received from the server:
1. Support a common control command to enable and disable datacasting (e.g. a datacasting button in the remote controller).
2. The Linear TV channel being transmitted must include a hyperlink descriptor in the SI (Service Information) tables.
3. When the datacasting button is pressed, the user agent requests the LIME document to the hyperlink address defined in 2.
4. The user agent receives the LIME content (document) which includes the ID of the Linear TV channel from the LIME content.
5. The screen is rendered with both the TV program and the enhanced datacasting content.
In conclusion, web base with XHTML, CSS, and ECMA Script is a lightweight solution for bring the Internet to TV program. read more...

Sniffing Your History

by Jonathan F
There are a number of webs sites that can take a look at your browsing history. They are a number of them that are torrent sites and porn sites. It is easy to stay away from these kinds of sites but there are also a number of news sites that also track your browsing history. Research done at the University of California, San Diego found that 485 of the world’s 50,000 most popular sites have the capability of reading your browsing history. They do this by using a property of the Cascading Style Sheets language used for page layout. They use the “a; visted” property of (CSS) to their advantage. What this property does is that it changes the color of the links that you have visited and it is stored by the browser. What they do is that they put a bunch of invisible links to third-party sites on their site. Then they use JavaScript code to learn what color the invisible links are to figure out what sites you have visited, so if you have visited them then the color is different to the link. So from there they could create a list of sites that you have visited. The research shows that out of the 485 sites only 46 of them download that history and about 18 actually use it to analyze user visits to certain sites. History sniffing has been around for a while and it could be used to profile a person. There are people that think that its good because companies would only display advertising or links to sites that you would like based on your browsing history .They would only show you services or links that you tend to use.  The advice that is given by the article is to use browsers that prevent this, which are Chrome, Firefox, and Safari. Internet Explorer is secure only when using private browsing. read more...