Tagged articles
4 articles
Page 1 of 1
System Architect Go
System Architect Go
Mar 2, 2021 · Information Security

OS Command Injection

This article explains what OS command injection is, how it can be detected and exploited on both Linux and Windows systems, demonstrates common payloads and techniques—including blind and out‑of‑band methods—and provides best‑practice defenses to prevent such vulnerabilities.

OS command injectiondefense techniquesshell injection
0 likes · 10 min read
OS Command Injection
MaGe Linux Operations
MaGe Linux Operations
Jan 14, 2019 · Information Security

Explore the Complete Network Security Mind Map: From Basics to Advanced Defenses

This article presents a comprehensive collection of network security mind maps covering introductory concepts, scanning and defense techniques, monitoring, password cracking, deception attacks, denial-of-service, buffer overflow, web, trojan, virus threats, and future trends, guiding learners through a structured technical roadmap.

cybersecuritydefense techniquesinformation security
0 likes · 3 min read
Explore the Complete Network Security Mind Map: From Basics to Advanced Defenses
MaGe Linux Operations
MaGe Linux Operations
Sep 19, 2017 · Information Security

Master Network Security: A Complete Mind Map of Threats & Defenses

This article presents a detailed mind‑map of network security, covering introductory concepts, scanning and defense, monitoring, password cracking, deception attacks, denial‑of‑service, buffer overflow, web and trojan attacks, computer viruses, and future trends, each illustrated with explanatory images.

Threat Detectioncybersecuritydefense techniques
0 likes · 3 min read
Master Network Security: A Complete Mind Map of Threats & Defenses
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

ModSecuritySecurity OperationsThreat Detection
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook