Quantcast
Channel: Information Security – Alien Coders
Browsing all 14 articles
Browse latest View live

Latest Linux vulnerabilities will make you feel insecure

In last two years major security bugs have been found and patched which might had affected innumerous users and servers.  On 28th October 2014, HD Moore, Chief Research Officer of Rapid7 shared about...

View Article



Risk Identification Process – Burning Challenges

Risk Identification Process – Burning Challenges Risk identification is one of the most important factor which decides the fate of Risk Management in an Enterprise or organization. Some of the key...

View Article

Keypoints for Auditing a Data Center

Auditing a Data Centre – Key points Data centres house the data, applications and access critical to the success of many businesses. Our data centre must be secure and resilient in order to keep our...

View Article

What and from where to start learning Reverse Engineering

Making an application using n number of options of programming languages using various algorithms and concepts is not as tougher as to find out the equivalent code (or same same code) from executable...

View Article

Data Privacy Assessment-Key Areas

Data Privacy Assessments – Key Areas Area 1: Transparency When the user information is collected from individuals, are they made aware of the uses for that information? Are Individuals made aware of...

View Article


WordPress 4.0.1 got released with many security updates

WordPress 4.0 was released 2 months back on 4th September, 2014 (Oh My Birthday 😉 ) and there were 8 security bug fix patched in security update in WordPress Version 4.0.1 on 20th November,2014. It has...

View Article

How to find WordPress version of a site

You want to know WordPress version of site which is not owned or administered by you or in simple word you want to know WordPress version without logging in to the site? First let’s see how we can find...

View Article

How to Generate Unique Secure Passwords You Remember

Our social life is growing. Day by day we are adding new sites. More and more services are going online. Along with this we all share the problem of remembering the passwords for various sites. Lot of...

View Article


Protect your system from Ransomware Cryptolocker Malware

If you are a Windows user and open any url or email without verifying its authenticity, then you are at risk of getting your whole system data decrypted by a malware popularly known as “Ransomware”....

View Article


Beware of WhatsApp Voice call spam message

We hear from long time that it is easy to breach human psychology as compare to robust software. Yes, WhatsApp Voice calling message floating around everyone’s whatsapp chat message is an example of...

View Article

SQL Injection Authentication Bypass Cheat Sheet

This list can be used by penetration testers when testing for SQL injection authentication bypass. A penetration tester can use it manually or through burp in order to automate the process. The creator...

View Article

Automated bash script to test HTTP HEADER Response

With below code we can try to automate the different methods that a web server or a website allow. HTTP Methods that we can test here are: GET HEAD POST PUT TRACE CONNECT DELETE We have used JAFFA an...

View Article

Hiding sensitive header response for IIS server

The purpose of this blog post is to discuss how to remove unwanted HTTP response headers from the response. Typically we have 3 response headers which many people want to remove for security reason....

View Article


Possible ways to hack mail account

It is very usual case now a days that mail accounts are getting compromised due to various reasons. I feel public awareness on Cyber Security is much needed. Specially in countries like India. Here are...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images