Quantcast
Channel: IT Certifications – Infosec Resources
Browsing latest articles
Browse All 933 View Live

Data Security in Windows 10

Introduction By design, Windows 10 is more secure than its predecessors Windows 7 and Windows 8.1. That’s what the people from Microsoft say, anyway. One excellent measuring tool regarding security is...

View Article



SQL Injection Vulnerabilities

Databases and the structured query language A database is designed to store data in an understandable and easily accessible way. Data is organized into tables, rows and columns, making it easy to find...

View Article

How to use Disk Quotas in Windows 10

Introduction Let’s say for a moment that it’s been a big family dinner and you’ve got one massive pie left for dessert. You ask who wants pie, and four people each say they want pie. You divide the pie...

View Article

How to use Windows 10 quick recovery options

Introduction In the days of Windows 10, everything is fine and happy and everything works all the time. OK, that may be just a tiny bit exaggerated. Like it or not, issues happen sometimes without...

View Article

Data execution prevention (DEP) in Windows 10

Introduction Does this sound familiar? “Sorry, not on the list.” “Oh come on! I was just in there five minutes ago! I just need to go get my coat.” “Not on the list.” “Okay.” Five minutes later: “Still...

View Article


How to configure password policies in Windows 10

Introduction A password is one of the common methods to authenticate user identity. Windows OS comes with various authentication options like PIN, password, fingerprint and token, but the feature used...

View Article

Cryptography-based Vulnerabilities in Applications

Introduction to cryptography Cryptography is designed to help protect the confidentiality, integrity and authenticity of data. By using an encryption algorithm, it is possible to transform data in a...

View Article

Least Privilege Vulnerabilities Exploitation Case Study

Introduction The principle of least privilege is a security concept that limits security exposure in IT environments through balancing security, productivity, privacy and risk. To put it simply, least...

View Article


Security controls for ICS/SCADA environments

Introduction  An Industrial Control System (ICS) is any technology used to control and monitor industrial activities. Supervisory control and data acquisition systems (SCADA) are a subset of ICS....

View Article


ICS/SCADA Wireless Attacks

Introduction Wireless communication has gained attention in the industrial environment. Many organizations have moved from wired networks to wireless in order to provide IT networks with hassle-free...

View Article

Cross-Site Scripting (XSS) Vulnerabilities

XSS: The most commonly exploited vulnerability Cross-site scripting (XSS) is one of the most common and well-known vulnerabilities contained within web applications. It consistently appears in the...

View Article

AWS Storage Services

Introduction Amazon offers several storage services, each optimized for specific use cases. In order to choose the best storage for your application, first we must understand the various offerings. In...

View Article

Cross-Site Request Forgery (CSRF) Vulnerabilities

Introduction to cookies and user authentication Cross-site request forgery (CSRF) vulnerabilities are designed to take actions on a website on behalf of an authenticated user. Accomplishing this...

View Article


HTTP-based Vulnerabilities

Introduction to HTTP and HTML vulnerabilities Web applications are commonly targeted by cybercriminals. The combination of public exposure and potential access to sensitive data makes them easily...

View Article

How to use Assigned Access in Windows 10

What is Assigned Access? Suppose you would like a user to use only one application on Windows OS. If this is a requirement, then the first thing which should come to your mind is the Assigned Access...

View Article


Configuring DNS in AWS

Introduction The Domain Name System (DNS) is necessary for routing traffic across the internet. It accomplishes this task by converting easily remembered domain names (example.com) into the IP...

View Article

Windows Supported wireless encryption types

Introduction We all want to keep our wireless network secure, to keep our personal data and information safe, don’t we? Fortunately, Windows supports multiple wireless encryption types. You, as the...

View Article


How to use Radare2 for reverse engineering

Introduction This article defines reverse-engineering as it is used in the analysis of software. We will explain in detail how to use radare2 for reverse engineering. It exposes techniques that can...

View Article

App isolation in Windows 10

What is app isolation in Windows 10? Suppose you want to install and run a new program on Windows but you think it may be risky and may harm your system. You want a safe way to isolate and run this...

View Article

Data Loss Protection (DLP) for ICS/SCADA

Introduction Data loss prevention (DLP) is a strategy that seeks to avoid the deletion, corruption or leakage of confidential or proprietary data stored on company devices, networks and servers. DLP’s...

View Article
Browsing latest articles
Browse All 933 View Live




Latest Images