Recently Security Researcher has uncovered an critical vulnerability in 2.6.22 versions(which was released in 2007) of Linux Platform and Android Platform. In short this vulnerability attackers to gain root access to servers and take control over the whole system. This week security researcher made this issue public. A vulnerability discovered in the Linux kernel has been present for nine years. […]
We are happy to announce Security Review guidelines for MongoDB. CIS guidelines are not available for Mongo DB and we thought this might be helpful for you. Content has been reference from MongoDB Original Website. I have create a sample command which will help you to extract the exact details required for performing security review. […]
Below are the steps of how to fix the banner (version information) in IIS 8.0/8.5 Step 1: Install the latest version of Microsoft Web Platform Installer (https://www.microsoft.com/web/downloads/platform.aspx/). Step 2: Install URL Rewrite 2.0 using Web Platform Installer on the server.
This article presents the key risks with DirectAccess and how to audit them. Let’s begin by first understanding the DirectAccess technology Introduction of DirectAccess From the Wikipedia definition DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Direct Access overcomes […]
Hi All, It’s been long time haven’t write any security post but i have come up with security issue on HP ALM Product 11. While testing HP ALM Product latest version I have found that the password encryption used by the Web Application was weak. I was able to break the Password encryption logic. What is […]
Hey!! We are back again with some more wealth I will be taking you through Operating System security and Database Security concepts. This won’t be a checklist based on different standards. Rather I would be grabbing some bits and pieces from best practices and explaining in detail the Risk, requirement and standard required settings. It […]
Most Commented Posts
Shashank Gosavi on Windows Mobile Application Security – Part II Superb. Are you planning to release process for WP10? It ...
pietro on Windows Mobile Application Security – Part II sono stato contento di sbirciare dentro al mio nokia 925 ...
Most Liked Posts
[Twitter Widget Error] You need to authenticate your Twitter App first. Go to Highend Options > Social Links. Read the documentation to find out more.