Useful tips for everyday
What is CGI generic SQL injection? Nessus says that: “An attacker may exploit this flaw to bypass authentication, read confidential data, modify the remote database,…
Is it possible to block torrent? You Can’t Just Block BitTorrent’s Ports Internet service providers and other network providers caught on. And, while you could…
How do I find the identity of a caller? Use *57. One option to try to discover the identity of an unknown caller is a…
What is the difference between compression and deduplication? Deduplication removes redundant data blocks, whereas compression removes additional redundant data within each data block. These techniques…
How to create an API with sensitive data? I’m designing api with method that should be an idempotent, and should not modify any data on…
Is CSRF token unique? A CSRF token is a unique, secret, unpredictable value that is generated by the server-side application and transmitted to the client…
What is asymmetric information explain in detail with suitable examples? Definition of asymmetric information: This is a situation where there is imperfect knowledge. In particular,…
Is DNSSEC slow? So, DNSSEC will in some cases slow resolution down in two ways: it adds additional data, which means more network traffic, and…
What is the password Based Key Derivation Function 2 PBKDF2 used for? In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 1 and 2) are…
Is Apple Time Capsule secure? When you switch a Time Capsule or network backup disk from unencrypted to encrypted, your existing backups are erased and…