Important commands to rescue hacked servers.

Important commands to rescue hacked servers.

This post will you a boost in tracing the trails of your server intruder. You can use this post as a reference for your periodic server health checks as well. This is a very important article for server security specialists, white hats and developer in general....
White Hat Hacking : Apple open redirect vulnerability

White Hat Hacking : Apple open redirect vulnerability

What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the visitor to another website. As mentioned in Everything is vulnerable ( Q4 in internet wars ). You should pay attention to URLs you...
Everything is vulnerable II : Internet wars

Everything is vulnerable II : Internet wars

Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to social networks users. Millions of defrauding are attempted every day and actually many succeed ! As a matter of fact, if you are...