Quantcast
Channel: Information Security – Alien Coders
Browsing latest articles
Browse All 14 View Live

Data Privacy Assessment-Key Areas

Data Privacy Assessments – Key Areas Area 1: Transparency When the user information is collected from individuals, are they made aware of the uses for that information? Are Individuals made aware of...

View Article


WordPress 4.0.1 got released with many security updates

WordPress 4.0 was released 2 months back on 4th September, 2014 (Oh My Birthday 😉 ) and there were 8 security bug fix patched in security update in WordPress Version 4.0.1 on 20th November,2014. It has...

View Article


How to find WordPress version of a site

You want to know WordPress version of site which is not owned or administered by you or in simple word you want to know WordPress version without logging in to the site? First let’s see how we can find...

View Article

How to Generate Unique Secure Passwords You Remember

Our social life is growing. Day by day we are adding new sites. More and more services are going online. Along with this we all share the problem of remembering the passwords for various sites. Lot of...

View Article

Protect your system from Ransomware Cryptolocker Malware

If you are a Windows user and open any url or email without verifying its authenticity, then you are at risk of getting your whole system data decrypted by a malware popularly known as “Ransomware”....

View Article


Beware of WhatsApp Voice call spam message

We hear from long time that it is easy to breach human psychology as compare to robust software. Yes, WhatsApp Voice calling message floating around everyone’s whatsapp chat message is an example of...

View Article

SQL Injection Authentication Bypass Cheat Sheet

This list can be used by penetration testers when testing for SQL injection authentication bypass. A penetration tester can use it manually or through burp in order to automate the process. The creator...

View Article

Automated bash script to test HTTP HEADER Response

With below code we can try to automate the different methods that a web server or a website allow. HTTP Methods that we can test here are: GET HEAD POST PUT TRACE CONNECT DELETE We have used JAFFA an...

View Article


Hiding sensitive header response for IIS server

The purpose of this blog post is to discuss how to remove unwanted HTTP response headers from the response. Typically we have 3 response headers which many people want to remove for security reason....

View Article


Possible ways to hack mail account

It is very usual case now a days that mail accounts are getting compromised due to various reasons. I feel public awareness on Cyber Security is much needed. Specially in countries like India. Here are...

View Article
Browsing latest articles
Browse All 14 View Live