Home Tags Web applications

Tag: web applications

Securing Apache, Part 7: Fool-proofing the Server OS

Moving deeper into Web application and Apache security, let's now focus on OS commanding attacks, and those that lead to the disclosure of crucial...

lighttpd & SQLite: A Lightweight Web Server and Database Platform

This article demonstrates the setting up of a lightweight Web server and database platform, using the lighttpd Web server and the SQLite database management...
Advertisement

WordPress Plugin Development Basics

WordPress is by far one of the best content management systems, with a fantastic framework for customisation. The use of plugins, themes and multi-site...

Securing Apache, Part 5: HTTP Message Architecture

In the last four articles in this series, we have discussed SQL injection, XSS, CSRF, XST and XSHM attacks, and security solutions. This article...

‘Microsoft’s Working Towards Establishing a Long-term Community Connection’

"Microsoft is open to openness," says Vijay Rajagopalan, principal architect in Microsoft's interoperability team. The LINUX For You team caught up with him to...

Secure Upload Methods in PHP

Here's how to deal with file upload attacks against sites developed in PHP, and how to write more secure code to prevent these attacks. In...
Advertisement

Securing Apache, Part 4: Cross-site Tracing (XST) & Cross-site History Manipulation...

This series of articles addresses the Web security concerns of information security experts, systems administrators and all those who want to jump-start their careers...

App Inventor: Develop Android Apps in a Jiffy

Here's introducing Google's new App Inventor service (the beta version) to design graphic applications for the Android platform. The Android in question is 1.5...

Securing Apache, Part 3: Cross-Site Request Forgery Attacks (XSRF)

Intended for information security experts, systems administrators, and all those concerned about Web security, this third article in the series moves on from SQL...

BackTrack 4: A One-Stop Shop for Security Analysis and Learning

Computer security analysts have plenty of tools available nowadays to evaluate the security of corporate networks, servers and applications. These include Linux distributions specialising...
Advertisement

Block title