Skip to main content

Posts

Showing posts from April, 2015

Network Security

Types of Security Threats In general, network security threats can be classified into one of two categories: disruption,destruction and disaster and unauthorized access. disruptions are usually minor and temporary. Some disruptions may also be caused by or result in the destruction of data. Natural or man made disasters may occur that destroy host computers or large sections of the network. Unauthorized access refers to intruders (external hackers or organizational employees) gaining unauthorized access to files. The intruder may gain knowledge, change files to commit fraud or theft or destroy information to injure the organization.  Risk Assessment Developing a secure network means developing controls that reduce or eliminate threats to the network. Controls prevent, detect  and correct whatever might happen to the organization when its computer based systems are threatened. The first step in developing a secure network is to conduct a risk assessment. This is done by com

Javascript to validate Email Expression

Using  regular expressions  is probably the best way. Here's an example ( live demo ): function validateEmail ( email ) { var re = /^([\w-]+(?:\.[\w-]+)*)@((?:[\w-]+\.)*\w[\w-]{0,66})\.([a-z]{2,6}(?:\.[a-z]{2})?)$/ i ; return re . test ( email ); } But keep in mind that one should not rely only upon JavaScript validation. JavaScript can easily be disabled. This should be validated on the server side as well.