877.791.9571 |

About the Author:

Nikhil Kumar, a Certified Ethical Hacker, works as a Information Security Consultant. He has experience in web application pen-testing, social engineering, password cracking and android pen-testing. He is also involved with various organizations to help them in strengthening the security of their applications and infrastructure.

Analyzing the Mod Security Logs

In the previous article, we had already configured the Mod-Security Firewall with OWASP Core Rule Set (CRS). But installing and configuring the Mod Security alone is not enough, as […]


Configuring the ModSecurity Firewall with OWASP Rules

In today’s world, over 70% of all attacks carried out over are done so at the web application level, so we need to implement security at multiple levels, as […]


DOS Deflate: Layer 7 DOS Protection Tool

DOS/DDOS stands for Denial of Service/Distributed Denial of Service. DOS or DDOS is a type of attack in which a machine or a network resource is unavailable to its […]