Organisations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. So an organisation makes different strategies in implementing […]
MASM is maintained by Microsoft and is an x86 assembler that consumes Windows and Intel syntax to produce a COFF executable. It is compatible for both 16 bit and 32 bit sources. Fortunately, Microsoft’s Visual Studio IDE endorses MASM programming tasks just by making a couple of project property […]
In cloud computing, there are a number of components used to build the cloud infrastructure. At the lowest layer there are actual hardware components like servers, network attached storage and network components. In order to limit the possibility of spreading an infection, networks need be properly separated into multiple […]
Darn, I had to change my Dropbox password a few days ago. For good measure, I changed my Google password, too. Although I only use it for OAuth these days, well, especially for OAuth, I changed my Facebook password, too.
Do you notice when you buy things online or log […]
Your goals during information gathering should be to gain accurate information about your targets without revealing your presence or your intentions, to learn how the organization operates, and to determine the best route. Metasploit is the best console for information gathering, as it is a very comprehensive penetration testing […]
Prohibition of Perfidy
Article 37 of AP I – Prohibition of perfidy
1. It is prohibited to kill, injure or capture an adversary by resorting to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under […]
Writing optimized website code is considered to be one the most complicated tasks. Hence, this paper explores amazing server side configuration techniques and various improvements to boost-up your ASP.NET website’s performance through the Internet Information Web Server. Dot NET websites goes live to the internet via IIS web server […]
What is Jus in Bello and Does it Regulate Cyber Attacks?
Jus in bello is a Latin term that means “law in waging war.” From a scholar’s point of view, it is known also as international humanitarian law (IHL), whereas military experts refer to it as the law of armed […]
Having a cheat sheet is a perfect starting initiative to assist you in generating ideas while penetration testing. A test case cheat sheet is often asked for in security penetration testing, but if there is some problem with this approach it is that security testers then tend to use […]
How is it that something can be so incredibly large and minutely small at the same time? If you’re as fascinated by natural science as I am, then you’re likely also watching Neil deGrasse Tyson’s reboot of the ‘Cosmos’ series. Maybe it makes you think about planets, our solar […]
Malware is software used to disrupt gather sensitive information, or gain access to private systems. Any program or piece of software that affects the working of a device can be called malware.
Nowadays, Mobile phones have become the victim of malware attacks. Among the mobile phone malware attacks, the Android […]
The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether would be possible to hack into an airplane and gain complete control control of on-board systems, excluding the pilots. In the past, we have seen many security experts present possible attack scenarios, but never […]
Background on DoD 8570
Before certifications, the only measurement of someone knowing what they said they know was through an educational degree or an impressive resume. The military was always used to training its members when they entered into the service. They provided some On the Job Training (OJT) while […]
To the uninitiated, Tor, formerly known as The Onion Router, is probably the most popular proxy network for internet anonmyzing. It’s called an onion router because traffic goes through many layers of encrypting servers. The gateway IP of the user and the destination IP are also encrypted, as opposed […]
Released in September 2013, CryptoLocker is a ransomware program that targets all versions of Windows, including Windows XP, Windows Vista, Windows 7, and Windows 8. This trojan encrypts almost all files using a combination of RSA & AES encryption. When the encryption is over, it will display a CryptoLocker […]
Edmand Dester Thipursian – Edmand.email@example.com
Sai Thogarcheti – Harikamurthy9@gmail.com
Abdullah Al Fahad – firstname.lastname@example.org
Chintan Gurjar – email@example.com
Adam Mentsiev – firstname.lastname@example.org
Alams Titus Mammuan – email@example.com
The world is growing rapidly with various technologies, and accordingly, illegal activities are being increased in adopting these new technologies. Every country has its own laws […]
Improper handling of session variables in asp.NET websites is considered a serious threat and opens various doors to malicious hackers. For instance, a session variable could be manipulated in a way to subvert login authentication mechanisms. However, this article illustrates a session fixation bug in a .NET website by […]
More and more, small, medium, and even large businesses are migrating from Microsoft products. Many of them are ridding themselves of Microsoft completely.
If you were to ask those IT departments why, they’ll give you a number of different reasons.
A motivating factor for many businesses is how the Linux kernel […]