"vulnerability" tag
This is how we get in...

Modify-function-return-value hack! — Part 2

In my previous article on this topic, we discussed some guidelines on how to write a secure application in C. The article focused on functions defined in the application itself. Now, we will…

Hacker alert!

Modify-function-return-value Hack! — Part 1

Sometimes it’s helpful to think from a hacker’s perspective. The information obtained can be used to write better code and a secure application. An application shipped in release mode (without any debug information)…

Secured!

Securing Apache, Part 9: Attacks that Target PHP-based Instances

Beginning with Part 1 of this series, we have covered all major attacks on Web applications and servers, with examples of vulnerable PHP code. In this article, we will cover those attacks that…

Lock it up!

Securing Apache, Part 1: The Basics

Targeted at readers with Web security concerns, information security experts, systems administrators and all those who want to jump-start their careers in Web security, this series of articles intends to cover the strengthening…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.