Month: January 2014

  • 10 Immutable Laws of Security

    Law #1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore Law #3: If a bad guy has unrestricted physical access to your computer, it’s not […]

  • Patterns For Large-Scale JavaScript Application Architecture

    Can you summarize this article in 140 characters? In the event of you being short for time, here’s the tweet-sized summary of this article: Decouple app. architecture w/module,facade & mediator patterns. Mods publish msgs, mediator acts as pub/sub mgr & facade handles security What exactly is a ‘large’ JavaScript application? Before we begin, let us […]