If you have used a webmail service like Gmail/ Yahoo/ Hotmail, then you have used a form of cloud computing.
Continue reading “Tech Terminology Demystified – Cloud Computing”
If you have used a webmail service like Gmail/ Yahoo/ Hotmail, then you have used a form of cloud computing.
Continue reading “Tech Terminology Demystified – Cloud Computing”
What the Information Security manager should aim for
There is a lot of confusion on what constitutes a 3G technology.
Virtualization is a buzzword that has been doing the rounds for a couple of years now. Does it really help organizations and how?
We are all very familiar with the term HTTP. We use it every day to access websites. HTTP stands for Hyper Text Transfer Protocol.
October 29, 1969. This is the day the Internet said it’s first word:’Lo’ as in ‘Lo and behold here comes the Internet’!! And then it crashed.
Let’s say that you have been asked by Abcxyz Inc to test their HR web portal. You decide to use fuzzing to check for easily guessable user IDs and passwords. You have collected a list of possible user names and a password dictionary has also been shortlisted by you.
Imagine that you are asked to test a web application. You decide to first look at the application to get an idea of what it does and how. The login page. You try to put yourself in an attacker’s shoe. How would he try to gain access to our application through the login page. One of things that come to your mind is
Web applications are those that are accessed using web browsers like Firefox or Internet Explorer. The protocol used by web applications is called Hyper Text Transfer Protocol (HTTP). The secure version of this protocol is HTTPS.