Understanding IP datagram – the easy way

It is important to understand the information which is presented in an IP Packets as it helps you understand how the integrity of the information you send across a local network or the internet can be compromised. Mainly IP datagram has two components: the header and the payload. The Header contains addressing and control fields […]

Learn to Love your Log files

Yes! Learn to Love your Log file, it tells everything you want to hear. Even a Clever thief always leave his fingerprints anywhere at the crime scene, in the same way most of the malicious exploit and intruders leave their fingerprints or say footprint all over the Log file. If the log file management system […]

The Ghost In The Browser

Today I found an interesting link on the Analysis of Web-based Malware produced by Google to present the state of malware on the Web and emphasize the importance of this rising threat. This whitepaper is really awesome where they discussed different mechanisms used to inject malicious content on popular web sites: web server security, user […]