Cross-site Request Forgery
In this article by Y.E Liang, the author of JavaScript Security, we will cover cross-site forgery. This topic is not exactly new. In this...
Untangle VPN Services
This article by Abd El-Monem A. El-Bawab, the author of Untangle Network Security, covers the Untangle solution, OpenVPN. OpenVPN is an SSL/TLS-based VPN, which...
Fundamentals
(For more resources related to this topic, see here.)
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment ( VA) and Penetrating Testing ( PT or PenTest )...
Knowing the SQL-injection attacks and securing our Android applications from them
(For more resources related to this topic, see here.)
Enumerating SQL-injection vulnerable content providers
Just like web applications, Android applications may use untrusted input to construct...
Rounding up…
(For more resources related to this topic, see here.)
We have now successfully learned how to secure our users' passwords using hashes; however, we should...
JAAS-based security authentication on JSPs
(For more resources related to this topic, see here.)
The deployment descriptor is the main configuration file of all the web applications. The container...
Securing vCloud Using the vCloud Networking and Security App Firewall
(For more resources related to this topic, see here.)
Creating a vCloud Networking and Security App firewall rule
In this article, we will create a VMware...
General Considerations
(For more resources related to this topic, see here.)
Building secure Node.js applications will require an understanding of the many different layers that it is...
Mobile and Social – the Threats You Should Know About
(For more resources related to this topic, see here.)
A prediction of the future (and the lottery numbers for next week) scams
Security threats, such as...
vCloud Networks
(For more resources related to this topic, see here.)
Basics
Network Virtualization is what makes vCloud Director such an awesome tool. However, before we go full...