4 down vote favorite share [g+] share [fb] share [tw] I am developing my site using server side sessions using redis as backend for saving the session. Now the issue which is bothering me is of user leaving the website without logging out. I mean user simply closes the browser which causes the cookie to be deleted. Now session of that user still exists on the server and will not be used again as new login requires creating a new session due to security reasons. To avoid the case where hacker steals the old cookie and use it after user login again with same old session id. In essence user leaves the website without explicitly logging out and his session will be deleted after certain time limit of inaccessibility. I am thinking time limit of 30-60 minutes. Also with every new request from user his cookie will also be updated to keep track of when the user last time accessed the site. But nowadays, people let site remain open for long time without accessing it. For example users open facebook and gmail in new tabs and forget about them for 2-3 hours and still they are not asked to login again. Is letting a 2-3 hours old cooke access the session secure? My concern is someone steals user cookie and use it 2-3 hours later. Thinking on this topic has also forced me to question how facebook manages security if user can use a session where they are not accessing it for long periods of time and still they remain logged in. Or is it not secure for me to keep logged in when am not accessing the site session for longer period of time? It can be the case also there is some pinging mechanism using which sites keep track of user having their site open in a browser and when browser closes they are notified and can work accordingly. My website is a social network and needs all those security and usage features which a social network may need. I am new to web security and web development in general and may be the case where my above questions may seem a little basic. If you feel that is the case kindly point to some good reference where I can read and find answers to my question.
1729Hi All..! This is Ratna,Im working as a Oracle apps Technical Consultant with 2yrs of experience.I started working on Hrms module,I feel like going for functional certification in HRMS module.Can any one suggest me on the below questions 1. how many papers are there for Oracle HRMS certification, and what is fees for each paper. 2. can a person pass the paper by reading the related documention provided by oracle. 3. do anybody have bunch of questons for oracle HRMS and like to share.
3226Hi All, I am new to programming and want to know how can i write a code to take input of 2 numbers from user and swap it without using a temp variable?
2 3561How can i write a code in c# to take a number from the user and then find all the prime numbers till the number entered by the user.
4 6017I have a list box which contains duplicate values e.g. A,A,A,B,B,B,C,C,C.Now write a code in qtp to test the list box . Scenario #1 : I have to check whether any values are there? Scenario #2 : If duplicate values are there,then how many time it is getting duplicated? Svenario #3 : how can I test presence of items in list box ommiting duplicate values?
6 12054Post New NIIT Interview Questions
How do you know if your jvm is up or not?
explain any diffcult scenario that u have faced in your experience... or explain any complex maping u have developed?
How can you insert a node to the beginning of a singly linked list?
What are the components provided on node?
What's the difference between categories and tags in wordpress?
Name some properties of thread class.
Explain Ruby if-else statement?
aptitutude and technical questions asked in HPCL MECHANICAL ENGG TEST PAPER. IF ANY ONE HAS SAMPLE PAPERS .PLEASE SEND ME ON MY E-MAIL ID . goyal.nirmal@gmail.com. plz
What is the difference between call transaction and session?
Is it possible to read pdf through automation anywhere and if yes, please explain the steps?
Is declare cursor executable?
Are methods objects in python?
What is callback in c#?
Explain all codd's rules for relational database system?
Explain what does cia stand for in security management?