Cross-site Scripting (XSS) Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious …
Author : Reetesh Gupta
322 posts
What is a payment gateway and how does it work? A payment gateway is an application that makes the entire process of online payment more streamlined and secure. It acts as a secure link between your website or application and the bank. The role of payment gateway begins when a customer wishes to purchase on …
APIs have become omnipresent in the world of software and mobile app development. Right from private solutions to public-facing services apps and partner integrations, it is present everywhere. They are helping developers in creating apps that caters to diverse set of customer needs. They are transforming the architectural patterns with much sophisticated approach of mobile …
SQL Injection (SQLi) is a type of an injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass application security measures. They can go around authentication and authorization of a web page or web application and retrieve the …
What are Barcodes? A barcode is a method of representing data in a visual format of machine-readable information about the item to which it is attached. A barcode represent data by varying in widths and spacing of parallel lines. Nowadays, the barcode is referred to as a linear or 1-dimensional code, that can be scanned …
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed. Distributed Denial of …
What is An SQL Injection Vulnerability? Within this blog post we are trying to shed a light on the technical aspects of SQL injections and what you can do to effectively avoid them. Non-Technical Explanation of the SQL Injection Vulnerability Imagine a fully-automated bus that functions based on instructions given by humans through a standard …
How To Setup Cron Jobs In Magento 2 Via SSH And Cpanel Clearly, from the viewpoint of management, the importance of automatic running the routine maintenance jobs in the background is undeniable. Since then, Linux Cron utility is an effective way to schedule a routine background job at a specific time and/or day on an on-going …
Google Authenticator is a two-step verification software used to keep your Google account and its related apps and programs more secure. You can download Google Authenticator as a smartphone app and use it when logging into Google apps and programs You should have two-factor authentication (2FA) turned on wherever you can, but there’s a more …
Introduction Amazon Web Services (AWS) has an extremely wide variety of services which cover almost all our infrastructure requirements. Among the given services, there is AWS Systems Manager which is a collection of services to manage AWS instances, hybrid environment, resources, and virtual machines by providing a common UI interface for all of them. Services …