Feeds

Examples of good practice, or not...

Buyer beware?

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

It's always an issue, when publishing tutorials, as to how much care you take about "good practice" peripheral to the main tutorial subject. What's appropriate when knocking up a quick demo to illustrate the capabilities of a new technology isn't appropriate when the new technology might end up in a business production environment - but you do need to concentrate on the main subject.

David Harper has highlighted this issue (and he might put it a bit more strongly than that) in an email; but the AJAX tutorial he's commenting on is just that, not a MySQL tutorial.

Nevertheless, his comment is well worth reading, I think:

I read part 1 of your AJAX tutorial with interest, and I'm looking forward to part 2, but as a MySQL database administrator, I winced when I saw your instructions on how to add a new user.

You should *never* insert records directly into the mysql.user table. In any case, the grant statement in your article achieves the same result as the "INSERT INTO user" statement immediately above it, and you don't need to follow a grant statement with "FLUSH PRIVILEGES".

Also, you should never routinely give users the grant privilege, since this is a gaping security hole, especially in a web application. In most situations, only the MySQL root user needs to have grant privileges.

Best regards, David Harper

Even so, although we do try hard to get things right, we also try to keep our articles reasonably short, so readers have time to read them. Which means that we can't always cover everything in detail.

I do rather hope that our professional readership isn't relying entirely on Register Developer for its professional "good practice". But, surely, professionals will already be working within a quality Development Process, supported by proper training courses?

I'll get me coat...

Remote control for virtualized desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.