In this article, we are going to see what are federation, single sign-on, and three federated identity standards, namely Security Assertion and Markup Language (SAML), OpenID and OAuth. We […]
Steganography is often mistaken with cryptography, but they are very different in their operations. The major similarity between them is they were coined from Greek words.
steganos – covered
cryptos – […]
Everything you need to know about the Bash Bug vulnerability
The Bash Bug vulnerability (CVE-2014-6271)
A new critical vulnerability, remotely exploitable, dubbed “Bash Bug”, is threatening billions of machines all over […]
To view Part I of the article series, please open: http://resources.infosecinstitute.com/website-hacking-101/
To view Part II of the article series, please open: http://resources.infosecinstitute.com/website-hacking-101-part-ii/
In this part of the Website Hacking 101 series, […]
By their nature, business endeavors involve various elements of risk. These elements may include technological, commercial, legal, financial, and environmental risks.
As technologies evolve, businesses become global and regulations more […]
1. What is an Acceptable Use Policy?
An Acceptable Use Policy (henceforward mentioned as “AUP”) is agreement between two or more parties to a computer network community, expressing in writing […]