The Complete Magazine on Open Source

Home Posts Tagged "attackers"

attackers

,

As personal, corporate and even national computer systems get subjected to stealthy, continuous cracking processes, it makes sense to be warned and armed. Read …

,

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider …

,

Beginning with Part 1 of this series, we have covered all major attacks on Web applications and servers, with examples of vulnerable PHP code. …

,

Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage …

,

In today’s fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to …

,

Here’s how to deal with file upload attacks against sites developed in PHP, and how to write more secure code to prevent these attacks. …

,

Steganography and cryptography have been widely used to hide sensitive information. This article offers a brief introduction to how both these methods can be …