We are all very familiar with the term HTTP. We use it every day to access websites. HTTP stands for Hyper Text Transfer Protocol.
We are all very familiar with the term HTTP. We use it every day to access websites. HTTP stands for Hyper Text Transfer Protocol.
October 29, 1969. This is the day the Internet said it’s first word:’Lo’ as in ‘Lo and behold here comes the Internet’!! And then it crashed.
The Information Technology (Amendment) Act, 2008 has come into force from October 27, 2009. So what are the key changes that have happened?
Continue reading “Information Technology Act 2000 now with sharper teeth !!”
In this article let us analyse the various technologies that ensure high data availability and redundancy. The following table makes a comparative analysis of clustering, mirroring, log shipping & data replication. Continue reading “Clustering vs. Mirroring vs. Log shipping vs. Data Replication”
Is it sufficient to just benchmarks threats based on CVSS ratings or do we need to do something more to actually understand the threat better Continue reading “Economic Value of a threat”
The IBM Internet Security Systems X-Force® research and development team has recently issued a white paper on Internet Security threats. Some of the key findings are Continue reading “Results of Internet Security Survey”
In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine from a completely “off” state. The attack relies on the data retention property of DRAM and SRAM to retrieve memory contents which remain readable in the seconds to minutes after power has been removed.
Credit card fraud is on the rise, and it is time to have a look at tips on how end users can protect themselves from Credit Card fraud.
Here is a compilation of some tips on how to protect yourself from credit card fraud:
Continue reading “How to protect yourself from Credit Card Fraud?”
When talking about telecommunication, we hear a lot about leased lines, ISDN and MPLS.
This article makes a comparative analysis among MPLS, MLLN and VPN. The following table captures the differences.
Continue reading “A comparative analysis of MPLS, MLLN and ISDN”
Let’s say that you have been asked by Abcxyz Inc to test their HR web portal. You decide to use fuzzing to check for easily guessable user IDs and passwords. You have collected a list of possible user names and a password dictionary has also been shortlisted by you.