Misc Security

Misc Security

I have a website and we are going to implement some payment gateways for people who purchase items from my website. I do not know much about web security but I would like to know how the system works. I want to know how we can authentic the cards we will be receiving payment from.

 

  • 794 views
  • 2 answers
  • 0 votes

Hashed and salted passwords are used in cryptography to reduce password vulnerability to hash attacks. What is the process of hashing? What is the process of salting? How do hashing and salting work to protect passwords from brute attacks? In this context, what is fingerprinting?

  • 614 views
  • 1 answers
  • 0 votes

What is Cross Site Scripting? When do these occur? How is a cross site scripting attack executed? What are the categories of Cross Site Scripting Attacks? What is a Dom based XSS? Are XSS attacks severe and can they cause an account to be compromised? How can you protect a site from XSS attacks? 

  • 664 views
  • 1 answers
  • 0 votes

What is a Secure Socket Layer (SSL)?  How does SSL work? If you are a trader, why is it important that you have SSL on your website? How can you identify if a website has a SSL? Who issues a SSL certificate? What are the details that are included in the certificate?

  • 646 views
  • 2 answers
  • 0 votes

Symmetric encryption is faster but difficult to implement. Explain why? What is it also known as ?How does it work ?What is asymmetric encryption? What is its alternate name? What is its disadvantage? Explain the process of asymmetric encryption? What is the use of digital certificates in the process of asymmetric encryption?

  • 511 views
  • 1 answers
  • 0 votes
Folder containing some .exe files of some c-programs gets infected from some type of virus. I need to execute some .exe files for my project and anti-virus is not working even after updating the anti-virus. Suggest some solution for this problem or some way to execute .exe file without getting damaged my computer-system.
  • 929 views
  • 1 answers
  • 0 votes

I have 4 Desktops Computers running on Windows XP Pro 32-bit. I am having a trouble with the Symantec Endpoint Protection when I install version 12.3.1 it is always request for a reboot. When I reboot the PC’s the log on screen from windows does not appears. What do you think is the problem? I don’t encounter this problem on older version 11.0700.

  • 921 views
  • 1 answers
  • 0 votes

Hello,

I am facing a problem on some users where Certificate errors pops up. This happens to users using Microsoft outlook 2010. Any one have info related to this issue. We use exchange 2007 self signed stump. We only use trusted Certificate. 

Thanks 

  • 776 views
  • 1 answers
  • 0 votes

 

My computer is facing Anti Virus Security Pro issues. Whenever I try to boot my system in SAFE mode and enter my login details, it reboots again. What possible can be done to handle this issue? Please help

  • 654 views
  • 1 answers
  • 0 votes

 

Microsoft Security Essentials has detected some kind of malicious software on my PC. I received the following three alerts: Remove, Quarantine and Allow. What option should I select and why? Will the file be deleted or shifted to any other folder in the PC?

  • 627 views
  • 1 answers
  • 0 votes

Latest Articles

Free cloud mining is coming! RICH Miner launches mobile mining, everyone can earn cryptocurrencies

RICH Miner officially launches a new mobile cloud mining application, subverting the traditional mining model! No need to buy mining machines, no technical experience required, just a mobile phone, global users can start the...

Rokid Max 2 Review: I Tried AR Glasses So I Could Watch Netflix in...

I’m not a tech geek. I don’t keep up with every new gadget launch. I fly a few times a year, watch many movies on my phone, and live in a small apartment where...

Top 10 Technology Trends For 2025

With 2025 just around the corner, it is time to start thinking about what tech trends will be coming our way. Tech moves at a rapid pace. Some things may pop up next year...

Latest Blogs

Top 10 New Laptop Entrants That Shook The Public

The finest laptops are powerful enough to do your daily tasks, comfortable enough to use all day, and power-efficient enough to ensure you don't run out of battery power unexpectedly. Of course, all these...

10 Facts About The Dark Web

Before getting into knowing the facts, let’s have a brief about the Dark Web. The dark web is the data of the World Wide Web that is accessible only through special software, combinations, or...

Top 10 Latest Steam Cleaner Machines

While looking for a chemical-free way to clear and purify both durable and low grounds in your home, a steam cleaner is an excellent solution. With a spurt of superheated steam, this cleaning equipment...

Latest Tips

Top 10 Internet Monitoring Software

Internet monitoring software keeps a log of all internet activities. You can install this type of software on your computer remotely or by the administrator. An operating console controls this software. This type of...

Top 10 Best Partition Manager Software

A Hard Disk Drive is usually partitioned into various smaller drives for optimization. A partition manager helps make this process easier and more efficient. Here, let’s discuss the top 10 best partition manager software. 1....

Top 10 Best Online Music Production Software

Music production is the initial stage of any song. Music production can be done either in studios or at home using an online music production software. Here, let’s discuss the top 10 best online...