uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4281 bookmarks.

Showing top Tags within 3 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   online   product   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   tutorial   description   explanation   learn   technology   build   article   blog   world   boat   project   download   windows   lookup   security   free   performance   javascript   technical   london   control   network   beautiful   tools   support   course   file   research   purchase   image   library   programming   youtube   example   php   construction   opensource   install   community   html   quality   profile   computer   feature   power   browser   music   platform   mobile   process   work   manage   professional   user   share   database   hardware   buy   industry   internet   dance   advice   developer   installation   camera   search   3d   access   customer   material   travel   money   test   standard   develop   css   review   documentation   engineering   photography   engine   webdesign   digital   device   speed   api   source   event   question   management   program   client   phone   discussion   story   simple   content   water   marketing   app   yacht   account   setup   idea   interface   package   fast   communication   cheap   compare   script   market   study   easy   live   google   resource   operation   demonstration   startup   monitor  


Tag selected: vulnerable.

Clear all

Showing 3 results.

Looking up vulnerable tag. Showing 3 results. Clear

Protecting Your Cookies: HttpOnly

https://blog.codinghorror.com/protecting-your-cookies-httponly/

Saved by uncleflo on June 30th, 2017.

So I have this friend. I've told him time and time again how dangerous XSS vulnerabilities are, and how XSS is now the most common of all publicly reported security vulnerabilities -- dwarfing old standards like buffer overruns and SQL injection. But will he listen? No. He's hard headed. He had to go and write his own HTML sanitizer. Because, well, how difficult can it be? How dangerous could this silly little toy scripting language running inside a browser be?

security horror protect write dangerous difficult vulnerable story blog explanation howto steal session script inject website administration escape xss hack


Acunetix - Website Security

https://www.acunetix.com/

Saved by uncleflo on June 30th, 2017.

Audit your website security. Firewalls, SSL and hardened networks are futile against web application hacking! Hackers are concentrating on web-based applications (shopping carts, forms, login pages, etc) – accessible 24/7 – and directly connected to your database backends with valuable data. Web applications are tailor-made, less tested than off-the-shelf software and likely to have undiscovered vulnerabilities that can be a recipe for disaster. Don’t overlook Website security at your organization! Acunetix is the leading web vulnerability scanner used by serious fortune 500 companies and widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology. It automatically crawls your websites and performs black box AND grey box hacking techniques which finds dangerous vulnerabilities that can compromise your website and data. Acunetix tests for SQL Injection, XSS, XXE, SSRF, Host Header Injection and over 3000 other web vulnerabilities. It has the most advanced scanning techniques generating the least false positives possible. Inbuilt vulnerability management helps you prioritize and manage vulnerability resolution.

security category web zone compromise possible vulnerable audit check assess corporate advanced scan website priority dangerous technique management built business procure service profile company


Certified Ethical Hacker - Cyber Security Academy

http://www.cybersecurityacademy.com/Certified-Ethical-Hacker.html

Saved by uncleflo on June 30th, 2017.

The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.

ethical hacker academy intruder course howto learn secure detection popular demand privilege engineer policy create virus plan conduct assessment penetrate vulnerable center


No further bookmarks found.