Title: PHP Security Scope of article In the open source world, PHP programming is always given first choice due to its availability and flexibility. It is a powerful server side scripting language, and provides a robust framework to create versatile Read more…
Title: Open Source Security Tools: TrueCrypt Scope of article In the last article we talked about Tripwire, which ensure the integrity of file system. In this article we extend the security from operating system and application files to one level Read more…
Title: Open Source Security Tools: Tripwire Scope of article With the increasing demand of cyber security in open source world, it has become important to know all the methods and tools available. There are many tools available, which can either Read more…
How to handle Non Persistent XSS injection Cross-site scripting (XSS) attacks are a type of injection, in which malicious scripts are injected in the client side of the web application to exploit confidential data stored in the browser like cookies, Read more…
Title: Built-in FOSS Security Scope of article When it comes to securing network infrastructure, it is a common trend to invest into commercial grade appliances. It is found that security designers tend to ignore built-in security features available within a Read more…
Title: Ensuring Security on Open Source Virtual Platform We must thank IT virtualization as it led us to cloud technology. Today’s IT infrastructures are already running their mission critical business applications on virtual machines. Like the physical infrastructure, virtualization is Read more…
Title: Cyber Attacks Explained: Wireless Attacks Scope of article Wireless networks are everywhere, from home to corporate data centers. They make our lives easy by avoiding bulky cables and related problems, while ensuring seamless connectivity of network nodes. As it Read more…
Title: Cyber Attacks Explained: Web Exploitation Scope of article Websites are no longer a means to have internet presence today, but are also used for commercial transactions and sensitive data transfers. Wider usage of internet helps hackers gain more knowledge Read more…
Title: Cyber Attacks Explained: Packet Spoofing Scope of article Last month we started this series of articles to cover important cyber attacks which impact critical IT infrastructure in organizations. The first one in the series was the denial of service Read more…
Title: Cyber Attacks Explained: Packet Crafting Scope of article In the previous articles of this series we covered common attacks found in most of the infrastructure vulnerability exploitation scenarios. This article takes a step forward, in terms of describing a Read more…