Donate to the Palestine's children, safe the people of Gaza.  >>>Donate Link...... Your contribution will help to save the life of Gaza people, who trapped in war conflict & urgently needed food, water, health care and more.
Rx iT World Hacking Tutorial
0
Types of XSS

Early on, two primary types of XSS were identified, Stored XSS and Reflected XSS. In 2005, Amit Klein defined a third type of XSS, which Amit coined DOM Based ...

0
Threat Modeling Process

This document describes a structured approach to application threat modeling that enables you to identify, quantify, and address the security risks associated ...

0
Threat Modeling

Threat modeling works to identify, communicate, and understand threats and mitigations within the context of protecting something of value. A threat model is ...

0
Source code analysis tools

Source code analysis tools, also known as Static Application Security Testing (SAST) Tools, can help analyze source code or compiled versions of code to help ...

0
Slow Down Online Guessing Attacks with Device Cookies

Device cookies as additional authenticator for users devices have been discussed and used in practice for some time already. For example, it was discussed by ...

0
Session Timeout

Session timeout represents the event occuring when a user does not perform any action on a web site during an interval (defined by a web server). The event, on ...

0
SameSite

SameSite prevents the browser from sending this cookie along with cross-site requests. The main goal is to mitigate the risk of cross-origin information ...

0
Secure Software Contract Annex

This contract Annex is intended to help software developers and their clients negotiate and capture important contractual terms and conditions related to the ...

0
Risk Rating Methodology

Discovering vulnerabilities is important, but being able to estimate the associated risk to the business is just as important. Early in the life cycle, one may ...

0
Variable Manipulation

What best practices I should remember while designing login pages? From login pages, users should be sent to a page for authentication. Once ...

0
Why Injection Happens to Good Developers

Injection is an attacker's attempt to send data to an application in a way that will change the meaning of commands being sent to an interpreter. For example, ...

0
Injection Flaws

An injection flaw is a vulnerability which allows an attacker to relay malicious code through an application to another system. This can include compromising ...

0
Improper Error Handling

Improper handling of errors can introduce a variety of security problems for a web site. The most common problem is when detailed internal error messages such ...

0
What is HttpOnly?

According to a daily blog article by Jordan Wiens, “No cookie for you!”, HttpOnly cookies were first implemented in 2002 by Microsoft Internet Explorer ...

0
How to Write Insecure Code

In the interest of ensuring that there will be a future for hackers, criminals, and others who want to destroy the digital future, this paper captures tips ...

0
Hibernate

Since ORM architecture isn't obvious, this document will explain some important things you need to know in order to analyze a Hibernate application in a ...

Show next
To Get Daily Health Newsletter

We don’t spam! Read our privacy policy for more info.

Download Mobile Apps
Follow us on Social Media
© 2012 - 2025; All rights reserved by authors. Powered by Mediarx International LTD, a subsidiary company of Rx Foundation.
RxHarun
Logo