Preview

Comparing Web Applications

Satisfactory Essays
Open Document
Open Document
489 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comparing Web Applications
Research 3: Comparing Web Applications Common Gateway Interface (CGI) is what enables an application to run on a web server and packages it into a website form that people can access. This is an older technology that has many flaws but served a purpose for a significant period of time. The major downside to CGI is that each individual person that logs on has a program ran just for them. This creates a lot of overhead and is not very efficient. The major security flaw is that you’re allowing anyone who tries to access your site permission to start running programs so you can imagine how this could get sticky. I would consider this a legacy technology due to the fact that it is outdated and not used in most instances. Internet Server Application Programming Interface (ISAPI) is the second generation version of CGI. Developers wanted to move away from having to run individual programs for each user and ISAPI satisfied those needs. There are 2 types of ISAPI although only 1 is still being used, first is ISAPI extensions; which utilize information from a database or information supplied by a client using a form and enables in-process applications that are generated dynamically. (Zacker, 2008) The second and less commonly used form is ISAPI Filters which is a routine that operates between the HTTP server and the HTTP listener. It is used to provide authentication, encryption and data compression. This form of ISAPI is out of date due to ISAPI extensions which run more efficiently. (Zacker, 2008) Server Side Includes (SSI) is another web server program that will cause the server to scan outgoing files and execute any commands or directives in the file before it sends it to the recipient. SSI has been around for a while and is not really practical to run for every web page due to the fact that the server will be working very hard to complete all the commands but it is still recommended in a limited capacity due to its simplicity. Active


Bibliography: Zacker, C. (2008). Windows Server 2008 Applications Infrastructure Configuration. Wiley.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2670 Week2 Research 3

    • 752 Words
    • 3 Pages

    The common gateway interface (CGI) is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user. It is part of the Web's Hypertext Transfer Protocol (HTTP). A disadvantage of a CGI application (or "executable file," as it is sometimes called) is that each time it is run, it runs as a separate process with its own address space, resulting in extra instructions that have to be performed, especially if many instances of it are running on behalf of users The improper use of CGI scripts affords users a number of vulnerabilities in system security. Failure to validate user input, poorly…

    • 752 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Pt1420 Unit 7 Analysis

    • 737 Words
    • 3 Pages

    Before I have examined to answer why do we think most web pages today require server side programming? Particularly meaningful to me toward defense entirely regarding the server side programming Characteristics, since there is a few common component of server side programming besides the technology we practiced which perform by:-…

    • 737 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Comparing Iis to Apache

    • 392 Words
    • 2 Pages

    Based on my research I would use Apache to implement since it is free and you can use it on multiple platforms. Apache is also more expandable and can be played around with more, unlike IIS.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It’s an N-tier API of IIS and consists of two components: extensions and filters. These are the only two types of applications that can be developed using ISAPI, they must be compiled into DLL files which are then registered with IIS to be run on the web server. ISAPI extensions are true applications that run on IIS, ISAPI filters are used to modify or enhance the functionality provided by IIS.…

    • 411 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Web Application Attacks Prevention advantage is used to benefit a protective or preventative standard used for determining the dimensions, area, with response capabilities such as an application layer firewall over a solution that identifies vulnerabilities in an application that are mean-full.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Serif PhotoPlus X6 is among the best photo editing applications available, this product is perfect for experienced photo editors or those who are just getting started.…

    • 362 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Headlines. (2012, 0522). Anonymous claims department of justice hack, data dump. Retrieved from http://anonnews.org/press/item/1521/ Information Security: Recent Attacks on Federal Web Sites Underscore Need for Stronger…

    • 1656 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    4. Why is connecting your web servers and web applications to the Internet like opening Pandora’s Box?…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Compare/Contrast research report New Year’s traditions in another country Now let’s write a research compare/contrast essay/report based on our findings or evidence. Introduction: *Explain what New Years is, and what country you researched. * Tell where that country is in the world (which continent and what other countries are around it.) *Also write that the purpose of this paper is to compare and contrast the information found on the sources used.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This section does not cite any references or sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (June 2013)…

    • 3807 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Jos van Iwaarden, Ton van der Wiele, Leslie Ball, Robert Millen, (2003),"Applying SERVQUAL to Web sites: an exploratory study",…

    • 7678 Words
    • 31 Pages
    Good Essays
  • Good Essays

    content management systems

    • 6376 Words
    • 26 Pages

    A web content management system[5] (web CMS) is a bundled or stand-alone application to create, manage, store and deploy content on Web pages. Web content includes text and embedded graphics, photos, video, audio, and code (e.g., for applications) that displays content or interacts with the user. A web CMS may catalog and index content, select or assemble content at runtime, or deliver content to specific visitors in a requested way, such as other languages. Web CMSs usually allow client control over HTML-based content, files, documents, and web hosting plans based on the system depth and the niche…

    • 6376 Words
    • 26 Pages
    Good Essays
  • Good Essays

    Jdbc Notes

    • 31946 Words
    • 128 Pages

    The Internet has spurred the invention of several new technologies in client/server computing—the most recent of which…

    • 31946 Words
    • 128 Pages
    Good Essays

Related Topics