How to make containers with same height in Bootstrap?

Small tutuorial on how to make containers with same height in Bootstrap?
11 October 2017   610

For example, you have this code:

<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script>
<head>
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" integrity="sha384-BVYiiSIFeK1dGmJRAkycuHAHRg32OmUcww7on3RYdg4Va+PmSTsz/K68vbdEjh4u" crossorigin="anonymous">
</head>

<body>
<div class="col-xs-3" id="left">
<p>short</p>
</div>
<div class="col-xs-3" id="right">
<p>long</p><p>long</p><p>long</p><p>long</p><p>long</p>
</div>
</body>

If you will run it, you will have this result:

Result of HTML code
Result of HTML code

As you can see, the left container and right container with different height. You can make them one size by y simply declaring display: flex on a wrapping parent will work. That means that you will have to wrap your columns in a new <div>, e.g.:

<div class="row row-equal-height">

  <div class="col-xs-3" id="left">
    <p>short</p>
  </div>
  <div class="col-xs-3" id="right">
    <p>long</p>
    <p>long</p>
    <p>long</p>
    <p>long</p>
    <p>long</p>
  </div>

</div>

For CSS, you can do this:

.row-equal-height {
    display: flex;
}

Note that you will have to rely on browser support for CSS3 flexbox specification. But it is very widely supported nowadays (>97%).

Google to Solve Chrome's HTML Vulnerability

Hackers could receive access to personal information using this vulnerability
17 August 2018   122

Google's developers have fixed a vulnerability in the Chrome browser, through which cybercriminals received secret information from other sites through audio and video HTML tags. Security researcher Ron Masas from Imperva identified the problem associated with the vulnerability of CVE-2018-6177, and in late July 2018 in Chrome 68 installed a security code.

According to the researcher, a cyber attack requires malicious code that downloads content from legitimate sites inside audio and video HTML tags. An attacker can determine the size of responses received from sites, and guess the various types of information. In the normal situation, this is not possible due to the CORS function, which prevents sites from downloading resources from other web pages, but the program is able to bypass protection.

Cybercriminals could get data on the sex and age of users using the Audience Restriction function in the settings of Facebook. According to Masas, collecting answers through social networks,hacker can consistently receive valuable personal information.

Another Internet security specialist, Mike Gualtieri, believes that when attacking, hacker can use a more creative approach than collecting data from Facebook users. For example, use corporate backend, intranet and corporate web applications. Thanks to the bug, the ability to send requests has appeared, so an attack on the API can also be successful.

Experts strongly recommend to update Chrome to v68.0.3440.75 or newer in order to prevent vulnerability.