Content Security Policy (CSP)

Posted on Aug. 1, 2019 By Robin

Content Security Policy (CSP) is a mechanism that developers can use to control resources which …

Protect nginx server identity

Posted on July 1, 2019 By Robin

NGINX web server's default configuration allows to return the type and version that it is …

Cross Site Scripting attack and prevention

Posted on Dec. 26, 2018 By Robin

Cross-Site Scripting ( abbreviated as XSS) attack is the most common application level attack technique …

OS Fingerprinting

Posted on Dec. 24, 2018 By Robin

How to control outbound DNS Access

Posted on Dec. 18, 2018 By Robin

User workstations, tablets and phone may be configured to send DNS requests to servers other …

How to prevent Ransomeware attack

Posted on Dec. 4, 2018 By Robin

Ransomware are the computer viruses that prevents you from using your computer unless you do …

PCI DSS High Level Requirements

Posted on Nov. 5, 2018 By Robin

The goal of the Payment Card Industry Data Security Standard (PCI DSS) is to protect …

Technical support scams starts with scammers claiming to be associated with companies offering legitimate support …

Security checklist for system administrators

Posted on Oct. 15, 2018 By Robin

Welcome to our blog

Posted on Oct. 1, 2018 By Robin