Online Safety: Things to Do & Things to Avoid

Either it is a battlefield or a football field, there are always certain safety tips given to people before going anywhere, & it is recommended to follow them all. In the same way, for your Online Safety, there are things that you should know before you go Online Things to do: Use a combination of […]

Learn to Love your Log files

Yes! Learn to Love your Log file, it tells everything you want to hear. Even a Clever thief always leave his fingerprints anywhere at the crime scene, in the same way most of the malicious exploit and intruders leave their fingerprints or say footprint all over the Log file. If the log file management system […]

XSS Attack Technique used by attackers

XSS attacks can be perform in two different ways, non-persistent and persistent. Non-persistent attacks require a user to visit a specially crafted link laced with malicious code. Upon visiting the link, the code embedded in the URL will be echoed and executed within the user’s web browser. Persistent attacks occur when the malicious code is […]