CALL US

+91 8219776763

Category: Linux

What is MITM (Men-In-The-Middle-Attack)

By Prempal Singh 1 Comment August 29, 2016

Overview A man-in-the-middle attack is a kind of cyber-attack where attacker inserts him/her into a conversation between two parties, try to impress both sides and gains access to information that both parties are trying to send to each other. A man-in-the-middle attack allows a malicious attacker to interception between sender and receiver sides. Attacker can send […]

What is SQL Injection?

By Prempal Singh 0 Comment August 22, 2016

Introduction of SQL SQL stands for Structured Query Language. It is used to exchange information with Database like create/update/delete. Standard Language for Relational Database Management System according to ANSI (American National Standards Institute). Used to perform task with database like create/delete/update/rename database and tables. In a database data is stored in table (Rows and Columns) form. Introduction […]

What is Cross Site Scripting (XSS)?

By Prempal Singh 0 Comment August 20, 2016

About Cross Site Scripting (XSS) It’s a very common vulnerability found in Web Applications, ‘XSS’ allows the attacker to insert malicious code, generally there are many types of XSS attacks, I will mention 3 widely used XSS that allows an attacker to inject some malicious code into the applications damaged as a way to bypass access to the […]

Virtual Private Network (VPN)

By Prempal Singh 2 Comments August 6, 2016

What is VPN A VPN or Virtual Private Network is a technique used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are generally employed by corporations to protect sensitive data. However, by using a personal VPN is more and more becoming very popular as more interactions […]

Proxy Server

By Prempal Singh 0 Comment August 6, 2016

What is Proxy Server A proxy server is another intermediate computer which serves as a hub by which internet demands are processed. By linking through one of those servers, your computer transmits your requests to the proxy server which then processes your request and returns what you were wanting. In this manner it acts as […]

error: Content is protected by Cyberops !!