Skip to content

Tag Archives: secure-coding

Each and every one of us always has this question “How to hack Facebook” in our minds, most of us have already tried looking for… Read More
Many web applications allows users to submit files in a compressed format (usually zip file format) to reduce the size of the file that is… Read More
Strict Mode was a new feature in ECMAScript 5 that allows you to place a program, or a function, in a “strict” operating context. This… Read More
There are many websites which deals with large chunks of data like retrieving postal codes of countries, driving license number where the functionality is based… Read More
Hill cipher is a polygraphic substitution cipher based on linear algebra.Each letter is represented by a number modulo 26. Often the simple scheme A =… Read More
What is Meltdown security vulnerability? Meltdown, also known as Rogue Data Cache Load, is a security vulnerability that affects microprocessors of the types Intel x86,… Read More
HMAC is a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in… Read More
Bacon’s cipher or the Baconian cipher is a method of steganography (a method of hiding a secret message as opposed to just a cipher) devised… Read More
While navigating the internet we are asked for our login credentials at almost every website we use regularly. One of the most important login credential… Read More
WannaCry is a type of ransomware that infected the National Health Service(NHS) and other organisations across the globe including government institutions in China, Russia, the… Read More
How are cookies used in a website  A cookie is a randomly generated alphanumeric string that is generated when you visit a webpage and is… Read More
This article explains how to test whether a website is safe from SQL injection using the SQLMAP penetration testing tool.  What is SQL Injection? SQL… Read More
As explained in this article, an SQL Injection attack, or an SQLi, is a way of exploiting the underlying vulnerability of an SQL statement by… Read More
ReDoS stands for Regular Expression Denial of Service. The ReDoS is an algorithmic complexity attack that produces a denial of service by providing a regular… Read More