Agenda: Introduction Company success vs. cooperation inside the company Forms of conflict Reasons for bad cooperation a) Mentality depending on the positions b) Understanding of
What is a Privacy Impact Assessment (PIA)? Privacy Impact Assessment is a process to determine the impacts of a program, system, service, scheme, initiative, application,
Injection and API Hooking – When you don’t know enough to know that you are getting it wrong… Code Injection and API hooking techniques are
There are times when people need access to information, such as documents, slides, etc., on a network drive but don’t have the appropriate level of
Introduction Every day, we read about cyber-attacks and data breaches, incidents that represent in many cases a disaster for private companies and governments. Technology plays
Agenda: 1. Prototyping – what is it? 2. The design process. 3. Showing the project to client before developers will write any line of code.
Before going ahead with the topic of SQL injection, let us first take a look into the construct of a web-based application. Most websites have
In a previous article, we introduced the concept of exceptions. As I mentioned, this is the most important thing when writing high-quality software. Today we
Introduction ZAP is an open source tool designed to help security professionals as well as developers to find out the security vulnerabilities present in the
Whether you’re an average Internet user, or an IT pro who checks Twitter before getting out of bed and goes through several SSH sessions before
In previous articles on the diagnosis of computer networks we generally learned a lot of tools available and understood how they work. Today we will
Introduction Immunity Debugger is a debugger which is very much like Ollydbg. In this tutorial we’ll present the Python API that Immunity Debugger uses for
Here is a compilation of a few tools that we need to be aware of. The power, the performance and the capabilities of these tools
Excerpted from CISSP All-in-One Exam Guide, 6th Edition by Shon Harris (McGraw-Hill; 2013) with permission from McGraw-Hill. Shon Harris, CISSP, MCSE, is the founder and CEO of Shon Harris Security LLC
Introduction Microsoft Detours is a library which we can use to build our own DLL that serves as an API monitor when analyzing the results.
Introduction We all know that vulnerabilities in web pages are quite common these days. They range from SQL injections, XSS vulnerabilities, CSRF, etc. In this
The Right to Anonymity Every operation made in cyber space, every visited web site, and every web service accessed, leave traces of the user’s experience
For part one of this series, please click here. Introduction So, in the previous part we saw how we can set up the environment for
As you know, I delight in writing articles on the Agile environment. Why is that? Because I like to advise people about the methodology of
1. Introduction We all know the prevalence of the WordPress blogging system and its share of vulnerabilities in the core system alone over the years.