Rx iT World Hacking Tutorial
Rx iT World Hacking Tutorial

CI/CD Security

CI/CD pipelines and processes facilitate efficient, repeatable software builds and ...
Rx iT World Hacking Tutorial

C-Based Toolchain Hardening

C-Based Toolchain Hardening is a treatment of project settings that will help you deliver ...
Rx iT World Hacking Tutorial

Bean validation

Bean validation (JSR303 aka Bean Validation 1.0 /JSR349 aka Bean Validation 1.1) is one ...
Rx iT World Hacking Tutorial

Authorization Testing Automation

Authorizations definition and implementation is one of the important protection measures ...
Rx iT World Hacking Tutorial

Authorization

Authorization may be defined as "the process of verifying that a requested action or ...
Rx iT World Hacking Tutorial

Authentication

Authentication is the process of verifying that an individual, entity, or website is ...
Rx iT World Hacking Tutorial

Attack Surface Analysis

This article describes a simple and pragmatic way of doing Attack Surface Analysis and ...
Rx iT World Hacking Tutorial

Abuse Case

Often when the security level of an application is mentioned in requirements, the ...
Rx iT World Hacking Tutorial

AJAX Security

This document will provide a starting point for AJAX security and will hopefully be ...
Rx iT World Hacking Tutorial

Types of API Tools

APIs are becoming an increasingly large portion of the software that powers the Internet ...
Rx iT World Hacking Tutorial

What is a Virtual Patch?

This paper presents a virtual patching framework that organizations can follow to ...
Rx iT World Hacking Tutorial

Using the Java Cryptographic Extensions

The code included in this article has not been reviewed and should not be used without ...
Rx iT World Hacking Tutorial

Types of XSS

Early on, two primary types of XSS were identified, Stored XSS and Reflected XSS. In ...
Rx iT World Hacking Tutorial

Threat Modeling Process

This document describes a structured approach to application threat modeling that enables ...
Rx iT World Hacking Tutorial

Threat Modeling

Threat modeling works to identify, communicate, and understand threats and mitigations ...
Rx iT World Hacking Tutorial

Source code analysis tools

Source code analysis tools, also known as Static Application Security Testing (SAST) ...
Rx iT World Hacking Tutorial

Slow Down Online Guessing Attacks with Device Cookies

Device cookies as additional authenticator for users devices have been discussed and used ...
Rx iT World Hacking Tutorial

Session Timeout

Session timeout represents the event occuring when a user does not perform any action on ...
Rx iT World Hacking Tutorial

SameSite

SameSite prevents the browser from sending this cookie along with cross-site requests. ...
Rx iT World Hacking Tutorial

Secure Software Contract Annex

This contract Annex is intended to help software developers and their clients negotiate ...
To Get Daily Health Newsletter

We don’t spam! Read our privacy policy for more info.

Download Mobile Apps
Follow us on Social Media
© 2012 - 2025; All rights reserved by authors. Powered by Mediarx International LTD, a subsidiary company of Rx Foundation.
RxHarun
Logo
Register New Account