debugging

Logging as a way to debug a code

Why is it important to forbid self-debugging by hand? When you debug a program, you yourself, without realizing it, think that for one debugging session, fix all the problems that have arisen in the...
DDos Protection concept image with pentagon shield and lock illu

How to protect web app on PHP from simple DDoS attacks

Quite recently an advertising article about the anti-DDoS attacks at the application level appeared on the hub. I had a similar experience of searching for the optimal algorithm for countering attacks,...

How to hijack RDS session

RDP hijacking  —  how to hijack RDS and RemoteApp sessions transparently to move through an organisation. How you can very easily use Remote Desktop Services to gain lateral movement through a...
bug bounty programs

About Bug Bounty Programs and Most Popular of Them

Very popular among hackers to surf internet in the search of bugs and wide variety of websites: manually, with scanners, using search engines etc Why hackers do this? Many years go was...
api exploits

API Exploits or How To Make API More Secure

As abundant of the software and application development companies are shifting to the APIs, the danger of security breaches has enhanced to a great extent. This is because of the circumstance...
protect customer data

6 steps for organizations to better protect customer data

Today very hard to protect customer data and your personal information from hacks and leakages, if somebody interested in your data - than be ready soon it can be published in...

Latest Updates