Blog

Content Security Policy (CSP)

Posted on Aug. 1, 2019 By Rob

Content Security Policy (CSP) is a mechanism that developers can use to control resources which …

Protect nginx server identity

Posted on July 1, 2019 By Rob

NGINX web server's default configuration allows to return the type and version that it is …

Domain Name System (DNS) infrastructure hijacking is where an attacker using the compromised credentials...

Cross Site Scripting attack and prevention

Posted on Dec. 26, 2018 By Rob

Cross-Site Scripting ( abbreviated as XSS) attack is the most common application level attack technique …

OS Fingerprinting

Posted on Dec. 24, 2018 By Rob

How to control outbound DNS Access

Posted on Dec. 18, 2018 By Rob

User workstations, tablets and phone may be configured to send DNS requests to servers other …

How to prevent Ransomeware attack

Posted on Dec. 4, 2018 By Rob

Ransomware are the computer viruses that prevents you from using your computer unless you do …

Mixed-Content pages are the web pages that are transmitted over secure HTTPS connection but include …

PCI DSS High Level Requirements

Posted on Nov. 5, 2018 By Rob

The goal of the Payment Card Industry Data Security Standard (PCI DSS) is to protect …

Technical support scams starts with scammers claiming to be associated with companies offering legitimate support …

Security checklist for system administrators

Posted on Oct. 15, 2018 By Rob

Welcome to our blog

Posted on Oct. 1, 2018 By Rob