Wednesday, June 24, 2009

Wolfram|Alpha

Wolfram|Alpha (also written as WolframAlpha and Wolfram Alpha) is an answer engine developed by Wolfram Research. It is an online service that answers factual queries directly by computing the answer from structured data, rather than providing a list of documents or web pages that might contain the answer as a search engine might. It was announced in March 2009 by Stephen Wolfram, and was released to the public on May 15, 2009.

Wolfram|Alpha is written in 5 million lines of Mathematica (using webMathematica and gridMathematica) code and runs on 10,000 CPUs (though the number is upgraded for the launch).


Wolfram|Alpha requires an up-to-date web browser. Internet Explorer 7, Mozilla Firefox 3, Safari 3, Google Chrome and Opera 10, along with all subsequent releases of these browsers, are compatible with the website.



Clickjacking

Clickjacking is a malicious technique of tricking web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function.

Cross-site scripting (XSS)

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. Vulnerabilities of this kind have been exploited to craft powerful phishing attacks and browser exploits. Cross-site scripting carried out on websites were roughly 80% of all documented security vulnerabilities as of 2007.[1] Often during an attack "everything looks fine" to the end-user[2] who may be subject to unauthorized access, theft of sensitive data, and financial loss.[3]