Articles

Identity Proof Your Personal Data

Information is being collected about us every second of every day without us ever realizing what happens to it. Most of us don’t really care what happens to our personal data as long as it isn’t misused. So let’s go…

Nessus Basics

The „Nessus” Project was started by Renaud Deraison in1998, Nessus was not the first free open-source vulnerability scanner but it is the most ubiquitous open source scanner. On October 5, 2005, Tenable Network Security changed Nessus 3 to a proprietary…

Web Testing Using Active and Passive Scanners

Website creation has become so simple that just anyone can do it. This doesn’t mean that everyone can do it well. There are so many frameworks and tools available to make dynamic sites easy to put up quickly. The author…

Does your BlackBerry smartphone have ears?

The smartphone becomes the most popular gadget all over the world. Undoubtedly, compactness, convenience and PCs’ functional capabilities have been winning modern users’ hearts. People may think that Internet surfing is safer with their favorite smartphone than by PCs and…

Mummies still walk among us!

Imagine all the great sources of information on the Internet today such as: news groups, blogs, websites and forums, and you still see networks, and websites being hacked and torn down using old hacking techniques. For God sake, isn’t that…

Firestarter: Starter to your Firewall

The firewall is the first line of defense on the network perimeter and end points. Firewalls are the gatekeepers to facilitate the flow of necessary traffic to and from assets. The author in his article focuses on the best practices…

Web Applications: Access Control and Authorization Issues

This article is about different kinds of Access Control mechanisms and issues with them in Web Applications. Where sufficient authorization checks are lacking, access controls may be abused by the logged-in user. The impact can be catastrophic. Improper access control…

Web Applications: Testing and Securing Your Code

With the high demand for applications and information, companies have made data readily and easily available. Web applications, to keep in touch with friends, download music, or order a new espresso machine, are used so commonly you seldom think about…

An overview of Web Application Security Issues

Web application security is very much in its infancy – some security experts believe this is going to be a major emerging area of technology. Nowadays web apps are more complex and are based on a client-server architecture. This architecture…