Tag: security
Questions Related to security
-
a mechanism of sharing scripts between two websites
-
a code injection technique that exploits a security vulnerability occurring in the database layer of an application
-
is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject client-side script into web pages viewed by other users.
-
is a way to protect websites using JavaScripts
-
a code injection technique that exploits a security vulnerability occurring in the database layer of an application
-
is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject client-side script into web pages viewed by other users
-
is a way to allow users to query database using web
-
is a latest way to fight against database security issues
-
is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject client-side script into web pages viewed by other users.
-
is an attempt to make a computer resource unavailable to its intended users by sending invalid/forged requests
-
is a form of attack on a database-driven Web site in which the attacker executes unauthorized SQL commands by taking advantage of insecure code on a system connected to the Internet
-
is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts
-
is an action taken by server when invalid credentials are supplied by users
-
is an action taken by firewall to prevent access to malicious users
-
is an attempt to make a computer resource unavailable to its intended users
-
is a way to prevent Cross Site Scripting attacks
-
is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques (essentially a fancier, more technical way of lying).
-
is a way to educate users about different security issues
-
is a group formed by malicious users
-
is a practice of engineering dealing with Social Security
-
is by using complex passwords
-
is to encrypt the entire login transaction using something like SSL
-
is by not using public/shared PCs
-
is by sending credentials by POST method
-
cross-site scripting
-
command injection
-
path traversal attacks
-
SQL injection
-
Client-side data validation
-
Running the application under least privileges necessary
-
Filtering data with a default deny regular expression
-
Using parameterized queries to access a database