“Men shaking hands” image in the middle is made by geralt
1. What is an Acceptable Use Policy?
An Acceptable Use Policy (henceforward mentioned as “AUP”) is agreement between two or more parties to a computer network community, expressing in writing their intent to adhere to certain standards of behaviour with […]
But there’s no Santa Claus. I do indeed have a sanity clause, though.
Intelligence agencies and private security researchers in the United States, the United Kingdom, and other countries have had reason to suspect that the Chinese government may be spying on individuals, corporations, and governments by selling Huawei and […]
This is the fourth part of our Nmap Cheat Sheet. Here we will discuss more about firewall scanning, IDS/IPS Evasion, web server pen testing, etc. Before that, we should know some basics about firewall so that it will easy to bypass it.
What is a Firewall?
A firewall is nothing but […]
Malicious entities are common on the Internet and most often fall into a category of malware such as worms, viruses and Trojan horses. Malware poses a major threat on the Internet. The malware is often the source of further malicious activity such as DDOS attack, spam emails and the […]
The goal for this article is a sprint from never using Docker to using it to deploy a GUI application that only has a console deployment pattern for Docker.
Why would you want to Dockerize your application? Several reasons. LXC is certainly more powerful, but it also requires significantly more […]
What is Parameterized SQL Query? It is used for better performance, high efficiency and prevention of SQL injection vulnerability. Before going further, let us have a brief introduction to SQL injection.
SQL injection is a very popular and common web application vulnerability caused by improper handling of input data and […]
Application vulnerability is caused when a developer fails to sanitize the input from user and blindly uses it as an input for further data processing. One of the major parts of an application development is to validate user input data and pass it through proper sanitization and escaping.
What is […]
On September 9th, during Apple’s iPhone press event, the corporation announced a few new products, of which you’re probably already aware of. Two new iPhones to catch up with innovations that debuted with high end Android smartphones (such as the “phablet” form factor), an Apple Watch (surprisingly not called […]
The cloud has been around for some time now and is still gaining popularity in every day operations of IT companies. I’ve seen different companies with operational models 90% based on cloud services, where the rest of the 10% is constituted of in-house servers. The basic response after asking […]
Every day, our digital identity is menaced by several cyber threats that are becoming even more sophisticated. Every year, data breaches expose million of records that are used by cyber criminals for illegal activities. Particular attention is given to medical records, a specific type of data that is attracting […]
This article introduces sqlmap and shows how it can be used to detect and exploit SQL injection vulnerabilities.
2. SQL injection
This vulnerability allows the attacker to modify an SQL query. Improper validation of data sent by the user causes the data to be interpreted as a part of an […]
CAPTCHA has been implemented for decades to prevent automated scripts (Bots) from jamming registration or login pages. Even though tons of tools and research have exposed its weakness with the ability to reverse the image into plain text, plenty of insecure images are still out there being used on […]
In this article, we will learn how sensitive cryptographic key material can be taken away from DRAMs, which are used in most modern operating systems through an attack known as cold boot attack.
Though it is believed by many that a computer’s memory gets erased as soon it loses power […]
- Ge! Stop! What’s Segmentation?
The 80186 is a faster version of the 8086. It also has a 20-bit address bus and 16-bit data bus, but has an improved instruction set. The 80186 was never widely used in computer systems.
The real successor to the 8086 is the 80286, which […]
According to the technology market intelligence company “ABI Research”, there are currently more than 10 billion wirelessly connected devices. In 2030, the number of these devices will reach 30 billion. Some of these 30 billion will fall within the category of sleep-tracking devices.
A clear indication for the potential […]
Every organization should follow a proactive rather than a reactive approach to protect against threats, risks and vulnerabilities, to which if their IT infrastructure is exposed can lead to data loss, regulatory penalties, and lawsuits and damaged reputation. Moving on the same lines, to reduce the credit card fraud […]
JPMorgan Chase is the largest bank in the United States, with total assets of over $2.5 trillion. They reportedly spend about $250 million per year on technical security, or one dollar for every $10,000 they have in assets. They also employ more information security professionals than Google does, about […]
Clickjacking was first publicized by Jeremiah Grossman and Robert “Rsnake” Hansen in 2008. Clickjacking is an attack that is possible only by the use of iframes. Iframes are the HTML components that are used to load a webpage in a frame. Their height and width can be set to […]
There are very few things in the IT realm that cover as much territory as databases. Before the web, and more specifically before the advent of dynamic programming languages, these immense collections of data were the exclusive territory of the deep down programmers — rulers of their vast domain […]
The Domain Name Service (DNS) is an integral part of Internet access. It translates human-recognized domain names into computer-readable IP addresses in order to facilitate online communication and connection between devices.
Occasionally, an individual or enterprise needs to find a way to control certain aspects of Internet connections in order […]