Skip to content
Qadit Blog

Qadit Blog

Information Security, SSAE 16, ISO 27001, CISA, Cert-IN

Author: Aishwarya Kothaneth

Posted on February 20, 2010February 27, 2010

Tech Terminology Demystified – Cloud Computing

If you have used a webmail service like Gmail/ Yahoo/ Hotmail, then you have used a form of cloud computing.

 

Continue reading “Tech Terminology Demystified – Cloud Computing”

Posted on February 9, 2010February 25, 2010

Better password management

How you can enjoy better security

 

Continue reading “Better password management”

Posted on December 22, 2009December 22, 2009

Security Resolutions for 2010

What the Information Security manager should aim for

 

Continue reading “Security Resolutions for 2010”

Posted on December 21, 2009December 22, 2009

Tech Terminology Demystified – 3G

There is a lot of confusion on what constitutes a 3G technology.

 

Continue reading “Tech Terminology Demystified – 3G”

Posted on November 22, 2009December 22, 2009

Virtualization – How you can benefit

Virtualization is a buzzword that has been doing the rounds for a couple of years now. Does it really help organizations and how?

 

Continue reading “Virtualization – How you can benefit”

Posted on October 30, 2009October 30, 2009

Tech Terminology Demystified – HTTP

We are all very familiar with the term HTTP. We use it every day to access websites. HTTP stands for Hyper Text Transfer Protocol.

 

Continue reading “Tech Terminology Demystified – HTTP”

Posted on October 30, 2009

The Internet is 40

October 29, 1969. This is the day the Internet said it’s first word:’Lo’ as in ‘Lo and behold here comes the Internet’!! And then it crashed.

 

Continue reading “The Internet is 40”

Posted on September 27, 2009

Fuzzing with Webscarab

Let’s say that you have been asked by Abcxyz Inc to test their HR web portal. You decide to use fuzzing to check for easily guessable user IDs and passwords. You have collected a list of possible user names and a password dictionary has also been shortlisted by you.

 

Continue reading “Fuzzing with Webscarab”

Posted on September 27, 2009September 27, 2009

Tech Terminology Demystified – Fuzzing

Imagine that you are asked to test a web application. You decide to first look at the application to get an idea of what it does and how. The login page. You try to put yourself in an attacker’s shoe. How would he try to gain access to our application through the login page. One of things that come to your mind is

 

Continue reading “Tech Terminology Demystified – Fuzzing”

Posted on July 17, 2009July 17, 2009

Session Management in Web Applications

Web applications are those that are accessed using web browsers like Firefox or Internet Explorer. The protocol used by web applications is called Hyper Text Transfer Protocol (HTTP). The secure version of this protocol is HTTPS.

 

Continue reading “Session Management in Web Applications”

Posts pagination

Previous page Page 1 … Page 8 Page 9 Page 10 Next page

Recent Posts

  • Digital Personal Data Protection Act, 2023: An Interpretative Overview for Professionals
  • Implementing Trustworthy AI: A Practical View of ISO/IEC 42001:2023
  • Securing Oracle Cloud Infrastructure (OCI)
  • RansomExx Upgrades to Rust
  • KmsdBot, a new evasive bot for cryptomining activity and DDoS attacks

Recent Comments

    Archives

    • December 2025
    • April 2023
    • November 2022
    • May 2022
    • March 2021
    • December 2020
    • November 2019
    • October 2019
    • July 2019
    • June 2019
    • April 2019
    • March 2019
    • January 2019
    • December 2018
    • November 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • September 2017
    • August 2017
    • February 2017
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
    • October 2014
    • September 2014
    • August 2014
    • July 2014
    • June 2014
    • April 2014
    • February 2014
    • January 2014
    • December 2013
    • November 2013
    • October 2013
    • September 2013
    • August 2013
    • July 2013
    • June 2013
    • May 2013
    • March 2013
    • February 2013
    • December 2012
    • November 2012
    • October 2012
    • September 2012
    • December 2011
    • November 2011
    • October 2011
    • September 2011
    • August 2011
    • July 2011
    • June 2011
    • May 2011
    • April 2011
    • March 2011
    • February 2011
    • January 2011
    • December 2010
    • November 2010
    • October 2010
    • September 2010
    • August 2010
    • July 2010
    • June 2010
    • May 2010
    • April 2010
    • March 2010
    • February 2010
    • January 2010
    • December 2009
    • November 2009
    • October 2009
    • September 2009
    • August 2009
    • July 2009
    • June 2009
    • May 2009
    • April 2009
    • March 2009
    • February 2009

    Categories

    • Banking
    • Business Continuity & DR
    • ERP
    • Governance, Risk & Compliance
    • Information Technology
    • IT Security
    • IT Security Frauds
    • Microsoft
    • Network Security
    • OS Security
    • Uncategorized
    • website security

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Proudly powered by WordPress