CALL US

+91 8219776763

Blog

What is SQL Injection?

By Prempal Singh 0 Comment August 22, 2016

Introduction of SQL SQL stands for Structured Query Language. It is used to exchange information with Database like create/update/delete. Standard Language for Relational Database Management System according to ANSI (American National Standards Institute). Used to perform task with database like create/delete/update/rename database and tables. In a database data is stored in table (Rows and Columns) form. Introduction […]

What is Cross Site Scripting (XSS)?

By Prempal Singh 0 Comment August 20, 2016

About Cross Site Scripting (XSS) It’s a very common vulnerability found in Web Applications, ‘XSS’ allows the attacker to insert malicious code, generally there are many types of XSS attacks, I will mention 3 widely used XSS that allows an attacker to inject some malicious code into the applications damaged as a way to bypass access to the […]

How to block any website

By Prempal Singh 0 Comment August 19, 2016

Sometimes we require to restrict websites in computer system to limit access. Sites can be blacklisted for variable reasons: We can prevent sites with KNOWN malware on them, to protect our staff and students from having their personal details stolen or can infect the entire network and systems connected to them, which in return will create […]

Two Factor authentication security (Gmail)

By Prempal Singh 1 Comment August 13, 2016

What is Two Way Authentication Security: Two way authentication security is a process to authenticate user login twice to check whether login is genuine or fake. Two different scenarios can be discussed with example: Case 1: One Way Authentication Everyone have E-Mail IDs and the normal practice to login is via: User Name and Password […]

error: Content is protected by Cyberops !!