• LOGIN
    • No products in the cart.

All posts by Anna Kondzierska

13

Mar'17

My catch of 4 months in the Amazon IP address space- article by Remco Verhoef

The cloud is bringing a lot of interesting opportunities, enabling you to scale your server farm up and down depending …

Read More

02

Mar'17

Functional programming languages entering the mainstream- infographic by Appdynamics

Functional programming languages such as Scala, Clojure, and Haskell are quietly growing in popularity. These languages offer expressive and concise …

Read More

03

Oct'16

Resources and tools that will help you in your day to day activities by Vignesh

This is my first article in an international arena. Basically, from my web application testing background, I will share a …

Read More

21

Sep'16

Brakeman, a static analysis tool- interview with Justin Collins, creator of the tool

Dear Readers, today we present you an interview with Justin Collins who is the creator of Brakeman tool- a static analysis tool. He …

Read More

22

Aug'16

Bug Bounty Programs & mobile pentesting: Apple vs. Android

With so many data breaches and hackers breaking into systems, companies constantly scan and improve their code, to make it …

Read More

19

Aug'16

Exploiting blind SQL injections in ‘UPDATE’ and ‘INSERT’ statements without stacked queries by Sina Yazdanmehr

Overview The SQL injection attack was introduced around 1998 for the first time. This high-level risk vulnerability can be found …

Read More

04

Jul'16

How to prepare and use Docker for web pentest by Júnior Carreiro

Introduction Docker is the world’s leading software containerization platform. Using Docker we can create different environments for each Pentest type. …

Read More

22

Jun'16

MODERN PASSPHRASE SECURITY by Akshay Bhardwaj

A password is a set of characters used for authentication to verify identity or an access authorization to gain access …

Read More

30

May'16

State of Application Security: Perception vs. Reality

    You can find  find all three versions of this graphic, along with the report here: https://www.arxan.com/resources/state-of-application-security/  

Read More

23

May'16

Anatomy of medical device attacks

You can find  find all three versions of this graphic, along with the report here: https://www.arxan.com/solutions/healthcare/application-protection-for-healthcare-and-medical-devices/

Read More

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013