Nothing found!
It looks like nothing was found here!
Top Categories
11 Posts
Latest Blogs
29
Jan
Are HTTP cookies port specific ?
By
webmaster
I have two HTTP services running on one machine. I just want to know if they...
1 Min Read
29
Jan
How to create .pfx file from certificate and private key ?
By
webmaster
I need .pfx file to install https on website on IIS. I have two separate files:...
1 Min Read
29
Jan
Are HTTPS headers encrypted ?
By
webmaster
When sending data over HTTPS, I know the content is encrypted, however I hear...
1 Min Read
29
Jan
How to prevent SQL injection in PHP ?
By
webmaster
If user input is inserted without modification into an SQL query, then the...
1 Min Read
29
Jan
What is a VPN ? What is its use in Cyber Security ?
By
webmaster
VPN is an acronym that stands for Virtual Private Network. It creates a safe...
1 Min Read
29
Jan
What is the main purpose of Hashing ?
By
webmaster
Hashing is required when we have to compare a huge amount of data. We can...
1 Min Read
29
Jan
What is the difference between virus and worm ?
By
webmaster
A virus is a piece of harmful executable code that is attached to another...
1 Min Read
29
Jan
What is a Brute Force Attack ? How can you prevent it ?
By
webmaster
Brute Force is a way of finding out the right credentials by repetitively...
1 Min Read