Botnet attack is of an advanced type whereby the attacked computer system becomes an attacker itself. This causes serious concerns in the IT world which should be known to every system administrator and senior technology management. We will also discuss how FOSS systems should be protected by such an attack. […]

Cross-site request forgery vulnerability is currently ranked Number 8 on the OWASP Top 10 vulnerabilities chart and is a very common application-layer vulnerability to exploit. It’s also known as a one-click attack, Session Riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF. […]

What is PCI DSS

PCIDSS (Payment Card Industry Data Security Standard) is a set of standards that helps in protection of payment card data that is being stored, processed or transmitted. The standard helps in safeguarding the cardholder against misuse of their sensitive personal information and thereby reduces card fraud. […]

Slow HTTP attacks are denial-of-service (DoS) attacks in which the attacker sends HTTP requests in pieces slowly, one at a time to a Web server. If an HTTP request is not complete, or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the data. […]

Having a Cloud environment is becoming simpler day by day. But Management, Expansion, Monitoring, Regulating, Controlling, Security of Cloud has become real worry in any Organization who as of now have a Cloud domain. If Operations related to these are not legitimately taken care of then it influences the growth of the organization and its market value as well. […]

Copyrights ©2008: Valency Networks Pvt Ltd.