*+-SQL injection is a technique that exploits a security vulnerability from the database layer of an application. This technique consists in inserting malicious code into strings that are later passed to the database management system for parsing and execution. The main goal of this attack is to expose hidden data, to override valuable one, or […]
*+-There are several ways to protecting files and folders on your website from unauthorized users. For example, you can use PHP (or another server side programming language) to ask for login and password information on each page. Apache Web Server also allows you password protect individual files, folders, or your entire site in an easy […]
*+-Your password is what proves to the system that you are who you say you are. It’s like a key that opens the door to your account, computer, etc. and exposes all your data. You can’t login into your email, twitter, facebook or similar account without using your password. Until we can do retina scans […]