Home » Archive by category "How – To / Tutorial" (Page 12)

Encoding Decoding Data Using PHP

Encoding is a process of converting data from one to another form.  Encoding data so that it cannot be easily read is one of the key tenets of security. A good secure system not only takes measure to prevent data from being exposed but also ensure...

Integrating User Authentication Using PHP

User Authentication

Authentication is any process to verify that someone is who they claim they are. PHP is well suited programming language for User Authentication. Integrating User Authentication using PHP in website application you will usually find a MySQL database behind it. Authentication system most likely include...

Multitasking PHP and MySQL

Using Gearman

How often have you developed a website that using an external program or even a separated process? This case is not a common problem for website application because you want to make it run efficiently and fast as possible, Yet you need to provide crucial...

Improve Website Performance Through Caching

Improve Website Performance Using Cache

Cache is a component that stores data for future requests, so it can be served faster. If requested data is contained in cache, this request can be done by just reading the cache, no need to process it from beginning which is comparatively faster. A...

Protect Your Data Using BitLocker

How to use bitlocker

Bitlocker is a full encryption feature included with the Enterprise and Ultimate editions of Microsoft’s Windows. It’s a whole disk encryption solution. We can use it to protect hard disk in laptop, hard disk will be inaccessible without correct password. BitLocker (Bitlocker To Go) can...

Learn Android Programming From Scratch

Learn Android Programming

As a beginner android programmer, you will face a steep learning curve. It’s normal because to Learn Android Programming From Scratch is like learning to live in a foreign city. Even you speak the language, it will not feel like home at first. Everyone around...

How To Secure Wireless Computer

How to Secure Wireless Computer

This whole article will be focused on How to secure wireless computer from wireless network hack. Securing all your wireless computer can be a quite hard, it need much effort and spend a lot of money depends on security level. At a minimum, you can...

Finding Vulnerabilities In Network Systems

After you find out target’s network configuration using port scanner, You need to know what is your target’s weakness. You can step further by testing and see which vulnerabilities really stand out. Finding vulnerabilities in network systems is not hard to do. There are various...

Hacking Wireless Networks

Hacking Network Wireless

This article will focuses on attacks against wireless network as a whole (Hacking Wireless Networks). 802.11-based attacks against authentication, encryption, and other protocol weakness. We will divide to 5 main problems. Explore what can happen when you can obtain access to victim’s internal computers Port Scanning...

Prevent SQL Injection by Using Runtime Protection

In this article, we will consider runtime protection to prevent SQL Injection that is deployable without recompiling the application’s source code. Mainly covered here are software plugins for Web Servers and  application frameworks (For example .Net Framework, PHP, J2EE, etc.). The software solutions we will...