CALL US

+91 9116117170

Category: Web Application Security

What is sitemap.xml?

By Chandan Singh 0 Comment October 3, 2017

What is sitemap A great XML Sitemap is a sitemap created for search engines. The XML Sitemap is all of the all the URLs on your site that you want search engines like google to examine and index. The Sitemap also provides information on when pages get up-to-date and how important they are really. Search […]

How to Protect Yourself from DDoS Attack

By Chandan Singh 1 Comment September 8, 2016

  What is DDoS Attack DDoS is stands for Distributed Denial of Service (DDoS), used for make online service unavailable by send unlimited number of request to target area. Behavior of server is, it give response to all requests therefor DDoS attack server not able to response all requests, and the result will, that online […]

How to trace & get IP Address of Target Person

By Chandan Singh 0 Comment September 3, 2016

IP (Internet Protocol) Address is one of the most important components or part of the internet, as well as cyber forensics. With the help of IP address all digital devices, computers communicate with each other, and this is allotted to that device, such as static or dynamic. That all the reasons law enforcement agencies are […]

What is SQL Injection?

By Chandan Singh 0 Comment August 22, 2016

Introduction of SQL SQL stands for Structured Query Language. It is used to exchange information with Database like create/update/delete. Standard Language for Relational Database Management System according to ANSI (American National Standards Institute). Used to perform task with database like create/delete/update/rename database and tables. In a database data is stored in table (Rows and Columns) form. Introduction […]

Two Factor authentication security (Gmail)

By Chandan Singh 1 Comment August 13, 2016

What is Two Way Authentication Security: Two way authentication security is a process to authenticate user login twice to check whether login is genuine or fake. Two different scenarios can be discussed with example: Case 1: One Way Authentication Everyone have E-Mail IDs and the normal practice to login is via: User Name and Password […]

error: Content is protected by Cyberops !!