Tag: the basics
-
Xtreme Breakdown – Secure Hashing
What is the purpose of Hashing or what is the problem that it’s trying to solve? Let’s say you are trying to send a file from your device to your friend’s device and your friend would like to confirm whether the file you sent is the same file that is downloaded the same file or…
-
Brief Encyclopedia of CVSS
We have seen that there is a lot of noise going around CVSS as FIRST has launched version 4.0 and in this article, I would like to discuss what is CVSS and how it evolved. What is CVSS CVSS stands for Common Vulnerability Scoring System. NIAC unveiled it on 23 February 2005. The purpose of…
-
CVSS Infographic
CVSS is the scoring system managed and launched by the Forum of Incident Response and Security Teams(FIRST) but started by the National Information Assurance Partnership (NIAP) Here is the infographic that explains the journey of CVSS from birth to what it is today. I am going to write a detailed guide on how versions changed…
-
CVE vs CWE – The Layman Guide
When it comes to information security there are many standards, guides, frameworks and terminologies that you must learn to understand Infosec better. In this guide, I will help you understand the difference between two Acronyms that we use every day and also help you to understand when to use what. What is CVE? CVE stands…
-
What is Runtime Application Self Protection(RASP)
What is RASP? RASP stands for Runtime Application Self Protection, it is a technology that secures applications in runtime. RASP starts whenever any application configured with RASP executes and it protects the application in real-time. RASP intercepts all the calls between the app and the system validates them and makes sure they are secure. Whenever…
-
Free Malware scanners for WordPress
Ask anyone who has a website, the worst thing that could happen to his/her website is malware. What is malware? Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network. Once any device is infected with malware the controller will have full control of the infected device. Again…
-
Understanding permissions in windows
In this article, we are going to discuss the permissions in windows. I am not going to in-depth analysis but what I will try to do is to give an overview of how windows handle permissions. This is going to help you in privilege escalation of windows. These are the list of things that we…
-
X-Frame Options Missing, don’t let your button miss the click
XFO also know as X-Frame Options, if you are a web developer or aspirated to be one, security analyst then you might be hearing about X-Frame options. If you don’t know what it is and what is its role in security, then just hold on to the article. In this blog, I will be discussing…
-
Quick checklist while you are developing any application for DevSecOps
DevOps is the thing that every organization is looking up to from the last half-decade and almost all tech giants are following that even there are startups which made millions providing solutions on DevOps but then what’s next? What’s next big thing after DevOps and then it comes DevSecOps. What is DevSecOps? DevSecOps is nothing…
-
Memory Segmentation In a Nutshell
Memory segmentation is a place where all the things happen while any program is running. Memory is divided into several segments and in this article, we are going to discuss them Usually compiled program memory is divided into 5 segments text data bss heap stack