Donate to the Palestine's children, safe the people of Gaza.  >>>Donate Link...... Your contribution will help to save the life of Gaza people, who trapped in war conflict & urgently needed food, water, health care and more.
Rx iT World Hacking Tutorial
0
Cross-Site Request Forgery (CSRF)

A Cross-Site Request Forgery (CSRF) attack occurs when a malicious web site, email, blog, instant message, or program tricks an authenticated user's web ...

0
Multi-factor authentication (MFA)

Multi-factor authentication (MFA) is by far the best defense against the majority of password-related attacks, including credential stuffing and password ...

0
Content Security Policy (CSP) frame-ancestors directive

This cheat sheet is intended to provide guidance for developers on how to defend against Clickjacking, also known as UI redress attacks. There are three ...

0
Choosing and Using Security Questions

If you are curious, please have a look at this study by Microsoft Research in 2009 and this study performed at Google in 2015. The accompanying Security ...

0
CI/CD Security

CI/CD pipelines and processes facilitate efficient, repeatable software builds and deployments; as such, they occupy an important role in the modern SDLC. ...

0
C-Based Toolchain Hardening

C-Based Toolchain Hardening is a treatment of project settings that will help you deliver reliable and secure code when using C, C++ and Objective C languages ...

0
Bean validation

Bean validation (JSR303 aka Bean Validation 1.0 /JSR349 aka Bean Validation 1.1) is one of the most common ways to perform input validation in Java. It is an ...

0
Authorization Testing Automation

Authorizations definition and implementation is one of the important protection measures of an application. They are defined in the creation phase of the ...

0
Authorization

Authorization may be defined as "the process of verifying that a requested action or service is approved for a specific entity" (NIST). Authorization is ...

0
Authentication

Authentication is the process of verifying that an individual, entity, or website is who/what it claims to be. Authentication in the context of web ...

0
Attack Surface Analysis

This article describes a simple and pragmatic way of doing Attack Surface Analysis and managing an application's Attack Surface. It is targeted to be used by ...

0
Abuse Case

Often when the security level of an application is mentioned in requirements, the following expressions are met: The application must be secure. The ...

0
AJAX Security

This document will provide a starting point for AJAX security and will hopefully be updated and expanded reasonably often to provide more detailed information ...

0
Types of API Tools

APIs are becoming an increasingly large portion of the software that powers the Internet including mobile applications, single-page applications (SPAs) and ...

0
What is a Virtual Patch?

This paper presents a virtual patching framework that organizations can follow to maximize the timely implementation of virtual patches. It also demonstrates, ...

0
Using the Java Cryptographic Extensions

The code included in this article has not been reviewed and should not be used without proper analysis. If you have reviewed the included code or portions of ...

Show next
To Get Daily Health Newsletter

We don’t spam! Read our privacy policy for more info.

Download Mobile Apps
Follow us on Social Media
© 2012 - 2025; All rights reserved by authors. Powered by Mediarx International LTD, a subsidiary company of Rx Foundation.
RxHarun
Logo