owasp web security

Read about owasp web security, The latest news, videos, and discussion topics about owasp web security from alibabacloud.com

Web security technology and firewall (1)

data encryption technologies must be added to protect important commercial applications. In terms of data encryption, it is more important to constantly improve and improve the data encryption technology, making it difficult for criminals to gain access. Of course, computer system security is a very large scope. This chapter only discusses some possible situations when constructing the web, hoping to attra

Web server security need to pay attention to three aspects of the problem _win server

But as the core product of the network, the server technology is relatively complex, especially in the network era of virus rampant, the security problem appears more prominent. Now to provide some practical work summed up the experience, I hope to share with you to ensure that the Web server security.    I. Enhance the overall

How to use IIS to establish a high-security Web server "Turn"

Author: sunup Shen, Hu Jiehua Excerpt from Sadie Net As one of today's popular Web servers, IIS (Internet Information Server) provides powerful Internet and intranet service features, how to enhance IIS security, and build a high Security performance Web server, has become an important part of the IIS setup that cannot

Wapiti lightweight Web security vulnerability scanning tool and wapiti scanning tool

Wapiti lightweight Web security vulnerability scanning tool and wapiti scanning toolWapiti is a Web application vulnerability check tool. It has a "dark box operation" scan, that is, it does not care about the source code of the Web application, but it will scan the deployment of W

E-commerce Web site internet Security Defense Raiders

E-commerce website, the security of the Internet is very important, especially involved in the payment of this piece. This article summarizes some common common sense of web security defense, for your reference, but also want to be concerned with this piece of peer discussion on this topic.1. Information transfer encrypted HTTPS using symmetric or asymmetric encr

Save Zhao Ming-WEB Website Security Solution

Status quo analysis: Zhao Ming: website O M Manager Two questions are raised in the video: 1. Use security protection solutions to prevent attacks. 2. When an attack occurs, the system can promptly trigger an alarm, block the attack, and record the hacker behavior characteristics. The current website topology is as follows: Through the video, Zhi Zhaoming's website was attacked by hackers and changed. In the current website topology, there is only o

What can we do to save the security threats of web applications?

With the birth of a series of new Internet products such as Web2.0, social networks, and Weibo, the web-based Internet applications are becoming more and more extensive. In the process of enterprise informatization, various applications are deployed on the Web platform, the rapid development of Web Services has also aroused the strong attention of hackers, highli

Go to Chrome command line: disable-web-security implementing browser cross-domain

Note that this method is not available after the Chrome 48 releaseRecommend a new way to implement local cross-domain debug online resources and search for Chrome plugins Allow-Control-Allow-Origin: * .Https://chrome.google.com/webstore/detail/allow-control-allow-origi/nlfbmbojpeacfghkpbjhddihlkkiljbiChrome under Windows System (WIN7)1. Close all open chrome. (important). Otherwise, there will be no effect!2, create a shortcut to Chrome, the goal of modifying the shortcut is: 1

Go to Chrome command line: disable-web-security implementing browser cross-domain

Note that this method is not available after the Chrome 48 releaseRecommend a new way to implement local cross-domain debug online resources and search for Chrome plugins Allow-Control-Allow-Origin: * .Https://chrome.google.com/webstore/detail/allow-control-allow-origi/nlfbmbojpeacfghkpbjhddihlkkiljbiChrome under Windows System (WIN7)1. Close all open chrome. (important). Otherwise, there will be no effect!2, create a shortcut to Chrome, the goal of modifying the shortcut is: 1

Web Security Practices (3) Analysis of http-based server architecture

Author: Xuan soul Prerequisites: http protocol, proxy server, and web Firewall This series navigation http://www.cnblogs.com/xuanhun/archive/2008/10/25/1319523.html Security Technology Zone http://space.cnblogs.com/group/group_detail.aspx? Gid = 100566 Preface The web security practice series focuses on the practical r

Cross-Site Request Forgery (CSRF) in Web Security Testing (1)

Bkjia.com exclusive Article] Cross-Site Request Forgery (CSRF) is known as the "sleeping giant" among many vulnerabilities in the Web security field. Its threat level is also known as "reputation. This article briefly introduces this vulnerability and describes in detail the cause of this vulnerability, as well as the specific methods and examples for testing the black box and gray box vulnerabilities, fina

Configure Web Security

Configuring Web Security Web security is one of the most common services provided by the system. The main vulnerabilities of Web security servers include: physical path leakage CGI Source Code leakage directory traversal execution

Win2008 R2 WEB Server Security Settings Guide for disabling unnecessary services and shutting down ports _win servers

Security is the most important, the least service in exchange for the greatest security. This maximizes security by enabling only those services that need to be used, shutting down services that are temporarily unavailable, or services that are not being used. As a Web server, not all default services are required, so

Thoughts on Web Application Security (sequence)

a few days later.) It is a large Hong Kong-owned enterprise.WebAlso developed suchERPFor a few large systems, it is reasonable to say that such low-level mistakes will not occur.WebDevelopedIn the middle of the year, there are many examples like this. For example, you can manage permissions by hiding and displaying page buttons or by hiding and displaying menus. These System PairsInWebFor developers, the security is just a false one. Of course, an

XSS for Web Security Testing

Cross Site Scripting (XSS) is the most common vulnerability in Web applications. An attacker embeds a client script (such as JavaScript) in a webpage. When a user browses the webpage, the script is executed in the browser of the user to achieve the target of the attacker. for example, attackers can obtain users' cookies, navigate to malicious websites, and carry Trojans.As a tester, you need to understand the XSS principles, attack scenarios, and how

XSS for Web Security Testing

Cross Site Scripting (XSS) is the most common vulnerability in Web applications. An attacker embeds a client script (such as JavaScript) in a webpage. When a user browses the webpage, the script is executed in the browser of the user to achieve the target of the attacker. for example, attackers can obtain users' cookies, navigate to malicious websites, and carry Trojans. As a tester, you need to understand the XSS principles, attack scenarios, and how

A two-pronged approach to web database security audit tracking and backup

With the application of Web database more and more widely, the security problem of Web database becomes more and more prominent, how to guarantee and strengthen the security of database has become a problem that must be solved at present. Security control mode of database

Web server security Settings

Web server security has been a lack of attention, is a variety of sites are often the main reason for the black. Here is a summary of how to ensure the security of the Web server measures, I hope that those who are still vulnerable to the server to provide some help. This article mainly takes the Windows Server operati

Understanding the nature of Web application security issues

Transfer from http://blog.csdn.net/iwebsecurity/article/details/1688304I believe that we have heard more or less about various Web application security vulnerabilities, such as: cross-site scripting attacks (XSS), SQL injection, upload vulnerability ... Various.Here I do not deny the various naming and classification methods, nor the reasonableness of its naming, I would like to tell you that all kinds of

View web game account security from "Netease mailbox hacked"

In July 3, it was reported that the Netease mailbox system was hacked in a large area. Among them, 163, 126, 188, and yeah mailboxes were intruded. It is understood that hackers did not do any malicious damage, but only left a text document behind each domain name to express intrusion. Leaving such a joke seems to laugh at Netease's incompetence and reveal its greatness. Although this small episode has not caused any big losses to us, it has to make people doubt the

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.