2.5 C
Munich
Thursday, December 2, 2021
- Advertisement -
- Advertisement -spot_img

AUTHOR NAME

alfi_an

15 POSTS
0 COMMENTS

Public Key Certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a...

Certificate authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key...

Transport Layer Security

Transport Layer Security (TLS), and its now-deprecated predecessor, Secure Sockets Layer (SSL), are cryptographic protocols designed to provide communications security over a computer network. Several versions...

SSH

Introduction Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command...

KERBEROS

Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to...

XSS Content Security Policy

UNDERSTANDING CONTENT SECURITY POLICIES CSPs are not a new idea. Initially developed by the Mozilla Foundation, the CSP concept was first applied in Firefox...

Detecting DOM-Sourced Cross-Site Scripting inBrowser Extensions

Modern web applications are increasingly moving programcode to the client in the form of JavaScript. Meanwhile, moreand more vulnerabilities occurring purely on the client throughinteracting with...

Detecting Cross-Site Scripting Vulnerability using Concolic Testing

Many problems security, to systems that are accessible via Web applications. One example Cross-Site  Scripting  attacks  (XSS),  wherein  a  script is injected into an application and executed by...

Defend again XSS

XSS exploits are similar to SQL injection, an original form of code injection. This type of attack exploits an application’s output function that references poorly sanitized...

A Dynamic Detection Technique for XSS Vulnerabilitie

Cross-site scripting (XSS) vulnerability is a widespread and latent web security threat, its harm can be accompanied by the occurrence and development of other web vulnerabilities,...

Latest news

- Advertisement -spot_img