Advanced Search
Search Results
4 total results found
What to do if your e-mail is hacked
Standard steps to do if you believe your e-mail has been hacked:http://blogs.msdn.com/b/securitytipstalk/archive/2010/07/07/hotmail-hacked-take-these-steps.aspxWhile Hotmail is the most common target for hacking in the media, the instructions and general advic...
Security Engineering - free e-book
Free online copy of a good and comprehensive computer security book: Security Engineering: A Guide to Building Dependable Distributed Systems.“If you’re even thinking of doing any security engineering, you need to read this book”Bruce Schneier
CSS Design Concerns for IE6, IE7, and Firefox
Below is the beginning of (hopefully) an ongoing collection of design-related CSS issues concerning different browsers. For this initial posting, I focus on Firefox, IE6, and IE7.The good news regarding IE7 is that a lot of bugs were fixed. See the following...
SQL Injection (Application Vulnerability)
SummarySQL Injection is a type of security vulnerability that occurs when application does not properly sanitize user inputs. The vulnerability potentially allows attacker to arbitrarily manipulate queries sent to the database layer. This type of vulnerabili...