Tag: vulnerability
Troubleshooting Issues in Linux Applications
In order to address issues in applications, the author has listed what needs to be done whenever you install a third party application on...
Malware Analysis Using REMnux
This article explores malware analysis using the open source tool REMnux. It begins with the basics of malware, how it functions, the steps to...
Cross-Site Scripting Attacks Prevention is Better than Cure – XSS
Today, the Internet is full of crooks who could relieve you of your identity, your accounts and other valuable information, using malicious attacks such...
Modify-function-return-value hack! — Part 2
In my previous article on this topic, we discussed some guidelines on how to write a secure application in C. The article focused on...
Modify-function-return-value Hack! — Part 1
Sometimes it's helpful to think from a hacker's perspective. The information obtained can be used to write better code and a secure application. An...
Securing Apache, Part 9: Attacks that Target PHP-based Instances
Beginning with Part 1 of this series, we have covered all major attacks on Web applications and servers, with examples of vulnerable PHP code....
Securing Apache, Part 1: The Basics
Targeted at readers with Web security concerns, information security experts, systems administrators and all those who want to jump-start their careers in Web security,...