lacks a precise definition; it's mainly used as a catch-all term to cover Web sites that are more than just plain, static pages. Web 2.0 sites are more interactive, allowing people to tag photos posted online, for example. Unlike their predecessors, Web 2.0 sites deliver an experience more akin to using a desktop application.
One of the key enablers of the flashier Web sites is a programming technique known asGoogle Maps, , was one of the first Web applications to showcase the benefits of AJAX development techniques to a broad audience, as it let people use a mouse to move a map image around the screen.
Security researchers also have recently found a way toand attack connected servers or devices, such as routers or printers.
A malicious script can be embedded in a Web page and typically run without warning when the page is viewed in any ordinary browser.
Attackers could try to lure you to their own, rigged Web site. But an attack could also lurk on a trusted Web site by exploiting a common flaw known as. Big-name Web companies including Google, Microsoft and eBay have had to plug such holes. Earlier this week AOL's Netscape.com fixed such a flaw that let apparent fans of Digg.com .
How could an attack work?
What can I do to protect my PC or network?
What should Web site operators do?
The rise in Web site flaws has some security experts concerned that Web developers aren't paying enough attention to security. The buzz around Web 2.0 has people rushing to create new Web sites--with high hopes of making big bucks--but the development momentum is all about features, and protections are being neglected, they say.
Why am I reading about this now and not a decade ago?