How to secure database passwords in PHP ?
When a PHP application makes a database connection it of course generally needs to pass a login and password. If I’m...
Are HTTP cookies port specific ?
I have two HTTP services running on one machine. I just want to know if they share their cookies or whether the browser...
How to create .pfx file from certificate and private key ?
I need .pfx file to install https on website on IIS. I have two separate files: certificate (.cer or pem) and private key...
Are HTTPS headers encrypted ?
When sending data over HTTPS, I know the content is encrypted, however I hear mixed answers about whether the headers are...
How to prevent SQL injection in PHP ?
If user input is inserted without modification into an SQL query, then the application becomes vulnerable to SQL injection,...
What is a VPN ? What is its use in Cyber Security ?
VPN is an acronym that stands for Virtual Private Network. It creates a safe encrypted tunnel across the internet by...
What is the main purpose of Hashing ?
Hashing is required when we have to compare a huge amount of data. We can create different hash values for different data,...
What is the difference between virus and worm ?
A virus is a piece of harmful executable code that is attached to another executable file and can modify or erase data. When...
What is a Brute Force Attack ? How can you prevent it ?
Brute Force is a way of finding out the right credentials by repetitively trying all the permutations and combinations of...
What are the steps to set up a firewall ?
Username/password: modify the default password for a firewall device Remote administration: Disable the feature of the...
Differentiate between hashing and encryption
Hashing Encryption It is a method of converting data to a smaller fixed value known as the key, which is then...
What are the types of Cyber Security ?
The assets of every company are made up of a variety of various systems. These systems have a strong cybersecurity posture,...
Who are Black Hat, White Hat and Grey Hat Hackers ?
Black Hat hackers, sometimes known as crackers, attempt to obtain unauthorized access to a system in order to disrupt its...
What does XSS stand for ? How can it be prevented ?
XSS stands for Cross-site scripting. It is a web security flaw that allows an attacker to manipulate how users interact with...
What is Cryptography ?
Cryptography is the study of securing communications from outside observers. Encryption algorithms take the original...