Bash Shellcode truth
There are two Common Vulnerability and Exposure CVE-2014-6271 and CVE-2014-7169 Akamai has posted it’s response CERT has posted it’s vulnerability Note Red Hat has developed the following test: $ env…
Defend Your Systems
There are two Common Vulnerability and Exposure CVE-2014-6271 and CVE-2014-7169 Akamai has posted it’s response CERT has posted it’s vulnerability Note Red Hat has developed the following test: $ env…
To test or not to test? We are constantly inundated over different advertisements, and have an inherent distrust of something new. The problem that a company has is that ……
NTVUganda story Don’t look at the details of McKinnon and his extradition battle etc. (picture also from NTVUganda.co.ug) This is what is important: “Kenya’s Cabinet Secretary for Information Fred Matiang’i…
OWASP Testing Guidelines 2014 In software development there are 5 stages: Define, Design, Develop, Deploy, and Maintain. OWASP released some more overall testing methodology. When to test is the question?…
Arstechnica has the story Browsers are generally designed to prevent a script from one site from being able to access content from another site. They do this by enforcing what…