Since the beginning of time, developers have been writing code to store and handle user... more »
This article represents different scenarios related with XSS (cross-site scripting) and how... more »
File Encryption Decryption using AES Password Based Encryption (PBE)
This is a post in two parts. The first part discusses the current state and historical trends... more »
The state of NoSQL security is about as abysmal as the state of security in RDBMS systems.... more »
Stealth malware, Regin has arose, which even though discovered 24 hrs. ago, is thought to... more »
TL;DR: PGP/MIME has some serious flaws. I propose specifying an alternative method for... more »
There is special type of DDoS attacks, application level DDoS, which is quite hard to combat... more »
Users looking to visit online classifieds titan Craigslist on Sunday evening were redirected... more »
Many Linux distributions ship with the 'less' command automagically interfaced to... more »
A digital signature is a mathematical scheme that demonstrates the authenticity of a message... more »
Mobile apps are important gateways to malicious attacks, just like Web apps. It's high time... more »
Show more links
Discover best practices and the most useful tools for building the ideal integration architecture.
Advertising - Terms of Service - Privacy - © 1997-2014, DZone, Inc.