Hemant's Blogs
Showing posts with label
Information Systems Security
.
Show all posts
Showing posts with label
Information Systems Security
.
Show all posts
Thursday, February 2, 2017
Does Anti-virus software slow down your machine ?
›
If you are about to disable your Anti-virus and other security related plugins/software on your machine because it slows down your machine...
Thursday, July 21, 2016
application vulnerabilities
›
There are different classes of application vulnerabilities like SQL injection, Buffer Overflow, Stack overflow, Cross-Site scripting and s...
Wednesday, July 20, 2016
WEP | WPA PSK
›
The protocol IEEE 802.11 using WEP is very weak. The three core deficiencies with Wired Equivalent Privacy (WEP) are the use of static e...
DES (Data Encryption Standard) is weak because of the Key size but what else make DES weak?
›
1. Key Complement weakness reduces brute force attack to require 2 55 possibilities. 2. If the possibilities of data what we are encrypt...
1 comment:
SDLC - At what stage in the cycle do you "bring up" security?
›
During the development life cycle, it is important to plan for security integration. At what stage in the cycle do you "bring up"...
Wednesday, July 6, 2016
who is using my Wi-Fi !!!
›
Wireless Networks are predominantly week. Suppose you are wearing your hacker's hat and want to experiment hacking into a Wireless sig...
›
Home
View web version