"vulnerability" tag
magnifying glass with spam

Malware Analysis Using REMnux

This article explores malware analysis using the open source tool REMnux. It begins with the basics of malware, how it functions, the steps to building a malware analysis kit and then moves on…

Hacker visual

Cross-Site Scripting Attacks Prevention is Better than Cure – XSS

Today, the Internet is full of crooks who could relieve you of your identity, your accounts and other valuable information, using malicious attacks such as cross-site scripting – XSS. But if you are…

This is how we get in...

Modify-function-return-value hack! — Part 2

In my previous article on this topic, we discussed some guidelines on how to write a secure application in C. The article focused on functions defined in the application itself. Now, we will…

Hacker alert!

Modify-function-return-value Hack! — Part 1

Sometimes it’s helpful to think from a hacker’s perspective. The information obtained can be used to write better code and a secure application. An application shipped in release mode (without any debug information)…

Secured!

Securing Apache, Part 9: Attacks that Target PHP-based Instances

Beginning with Part 1 of this series, we have covered all major attacks on Web applications and servers, with examples of vulnerable PHP code. In this article, we will cover those attacks that…

Lock it up!

Securing Apache, Part 1: The Basics

Targeted at readers with Web security concerns, information security experts, systems administrators and all those who want to jump-start their careers in Web security, this series of articles intends to cover the strengthening…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.