Encoding is a process of converting data from one to another form. Encoding data so that it cannot be easily read is one of the key tenets of security. A good secure system not only takes measure to prevent data from being exposed but also ensure...
Integrating User Authentication Using PHP
Authentication is any process to verify that someone is who they claim they are. PHP is well suited programming language for User Authentication. Integrating User Authentication using PHP in website application you will usually find a MySQL database behind it. Authentication system most likely include...
Multitasking PHP and MySQL
How often have you developed a website that using an external program or even a separated process? This case is not a common problem for website application because you want to make it run efficiently and fast as possible, Yet you need to provide crucial...
Improve Website Performance Through Caching
Cache is a component that stores data for future requests, so it can be served faster. If requested data is contained in cache, this request can be done by just reading the cache, no need to process it from beginning which is comparatively faster. A...
Protect Your Data Using BitLocker
Bitlocker is a full encryption feature included with the Enterprise and Ultimate editions of Microsoft’s Windows. It’s a whole disk encryption solution. We can use it to protect hard disk in laptop, hard disk will be inaccessible without correct password. BitLocker (Bitlocker To Go) can...
Learn Android Programming From Scratch
As a beginner android programmer, you will face a steep learning curve. It’s normal because to Learn Android Programming From Scratch is like learning to live in a foreign city. Even you speak the language, it will not feel like home at first. Everyone around...
How To Secure Wireless Computer
This whole article will be focused on How to secure wireless computer from wireless network hack. Securing all your wireless computer can be a quite hard, it need much effort and spend a lot of money depends on security level. At a minimum, you can...
Finding Vulnerabilities In Network Systems
After you find out target’s network configuration using port scanner, You need to know what is your target’s weakness. You can step further by testing and see which vulnerabilities really stand out. Finding vulnerabilities in network systems is not hard to do. There are various...
Hacking Wireless Networks
This article will focuses on attacks against wireless network as a whole (Hacking Wireless Networks). 802.11-based attacks against authentication, encryption, and other protocol weakness. We will divide to 5 main problems. Explore what can happen when you can obtain access to victim’s internal computers Port Scanning...
Prevent SQL Injection by Using Runtime Protection
In this article, we will consider runtime protection to prevent SQL Injection that is deployable without recompiling the application’s source code. Mainly covered here are software plugins for Web Servers and application frameworks (For example .Net Framework, PHP, J2EE, etc.). The software solutions we will...
Latest Comment