Rx iT World Hacking Tutorial
0
Transient Blockage of the Internal Iliac Artery
0

The internal iliac artery is a crucial blood vessel in the pelvis, responsible for supplying blood to various organs and tissues in the lower abdomen and ...

0
GraphQL
0

GraphQL is an open source query language originally developed by Facebook that can be used to build APIs as an alternative to REST and SOAP. It has gained ...

0
Forgot Password Service
0

In order to implement a proper user management system, systems integrate a Forgot Password service that allows the user to request a password reset. Even ...

0
File upload
0

File upload is becoming a more and more essential part of any application, where the user is able to upload their photo, their CV, or a video showcasing a ...

0
Error Handling
0

Error handling is a part of the overall security of an application. Except in movies, an attack always begins with a Reconnaissance phase in which the attacker ...

0
The .NET Framework
0

The .NET Framework is Microsoft's principal platform for enterprise development. It is the supporting API for ASP.NET, Windows Desktop applications, Windows ...

0
Docker Containerization Technology
0

Docker is the most popular containerization technology. Upon proper use, it can increase the level of security (in comparison to running applications directly ...

0
Django framework is a powerful Python web framework
0

The Django framework is a powerful Python web framework, and it comes with built-in security features that can be used out-of-the-box to prevent common web ...

0
Django REST Framework
0

The Django REST framework abstracts developers from quite a bit of tedious work and provides the means to build APIs quickly and with ease using Django. New ...

0
Guidance on Deserializing Objects Safely
0

Serialization is the process of turning some object into a data format that can be restored later. People often serialize objects in order to save them for ...

0
Anti-DoS Methods
0

Because anti-DoS methods cannot be one-step solutions, your developers and application/infrastructure architects must develop DoS solutions carefully. They ...

0
Transport Layer Protection
0

This cheat sheet provides guidance on securely configuring and using the SQL and NoSQL databases. It is intended to be used by application developers when they ...

0
 XSS Prevention
0

The XSS Prevention Cheatsheet does an excellent job of addressing Reflected and Stored XSS. This cheatsheet addresses DOM (Document Object Model) based XSS and ...

0
DOM Clobbering 
0

DOM Clobbering is a type of code-reuse, HTML-only injection attack, where attackers confuse a web application by injecting HTML elements ...

0
Cryptographic Storage
0

Passwords should not be stored using reversible encryption - secure password hashing algorithms should be used instead. The Password Storage Cheat ...

0
Cross-Site Scripting (XSS)
0

Cross-Site Scripting (XSS) is a misnomer. Originally this term was derived from early versions of the attack that were primarily focused on stealing data ...

0
Cross-Site Request Forgery (CSRF)
0

A Cross-Site Request Forgery (CSRF) attack occurs when a malicious web site, email, blog, instant message, or program tricks an authenticated user's web ...

0
Multi-factor authentication (MFA)
0

Multi-factor authentication (MFA) is by far the best defense against the majority of password-related attacks, including credential stuffing and password ...

0
Content Security Policy (CSP) frame-ancestors directive
0

This cheat sheet is intended to provide guidance for developers on how to defend against Clickjacking, also known as UI redress attacks. There are three ...

0
Choosing and Using Security Questions
0

If you are curious, please have a look at this study by Microsoft Research in 2009 and this study performed at Google in 2015. The accompanying Security ...

RxHarun
Logo