The below mentioned are the best practices to be followed for Linux Hardening. The consolidation is done through personal experience as well as through research on various articles from the Internet. The information mentioned can be varied to one’s organisational needs. This …
Capture The Flag (CTF) is an ethical hacking competition. This contest has taken its name from an outdoor game which consists of two teams and each team has to capture the flag of another team. In CTF’s you get to handle the …
The below mentioned are the best practices to be followed for firewall hardening. The consolidation is done through personal experience as well as through research on various articles from the internet. The information mentioned can be varied according to one’s organizational needs. …
What is BCP 38? BCP 38 also known as Network Ingress Filtering is defined by RFC 2487 as a technique which ensures that incoming packets are from the source which they claim to be from. The main aim of BCP 38 id …
Introduction While Oracle is designed “secure by default,” this article explores a variety of those defaults and administrative approaches that help to minimize vulnerabilities. Please remember that the strategies discussed here are presented as options to consider rather than definitive rules to …
In the Information Age it won’t sound far-fetched, if we’re told that an entity is involved in Cyber Espionage at a Global Scale. But it’s a whole other story if we’re told that this Cyber Espionage is funded by the government of …
Introduction Oracle and SQL databases are one the most used databases in enterprises. I will be taking you through Oracle Hardening to make it hard for malicious users to break it the system. Focus will be on the parameters you need to …
Knowing how to manage incidents is a critical element for every security environment. The incident analysis begins with the forensic and terminates with the report given to the Incident Manager. The task involves digital forensic investigators, malware analysts and network operators. Only …
“If it ain’t broke, don’t fix it” is a wide spread phrase. Web developers usually develop applications based on this criteria and often forgets about security. This article discusses about such a security issue often neglected by developers. When creating protected parts …
Abstract This paper discuss about a number of ways through which hackers can use Mozilla Firefox as a platform to run there malicious piece of code with all the privileges and features as that supported by any native programming languages. Also there …