BROWSER FINGERPRINTING

  • Post author:

For some time, efforts have been going on to dissuade the use of browser fingerprinting thanks to the fraudulent practices it can corroborate. Tracking the users is still a cause…

Continue Reading BROWSER FINGERPRINTING

Apache Subversion (SVN)

  • Post author:

A version control system is considered as an inevitable tool for a developer. It is a repository of files that track and provide control over changes made in a source…

Continue Reading Apache Subversion (SVN)

SQL Injection

  • Post author:

SQL Injection (SQLI) is a code injection technique. Here, the attacker adds Structured Query Language code to a web input box. SQl is the universal language of databases and the…

Continue Reading SQL Injection

Responsive Web Design

  • Post author:

“You must be shapeless or formless, like water. When you pour water into a cup, it becomes the cup. When you pour water in a bottle, it becomes the bottle.…

Continue Reading Responsive Web Design

Fault-tolerant Data Storage Subsystem: A Saviour

  • Post author:

The present invention relates in general to an improved data processing system and in particular to a fault-tolerant data storage subsystem, for utilization within a data processing system. More importantly,…

Continue Reading Fault-tolerant Data Storage Subsystem: A Saviour

Raspberry Pi: Layman’s Linux Machine

  • Post author:

The Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer monitor or TV, and uses a standard keyboard and mouse. It is a capable little…

Continue Reading Raspberry Pi: Layman’s Linux Machine

LIGHTTPD

  • Post author:

Lighttpd (pronounced as lighty) is an open source web server and is a rival to the world's leading web server-Apache! Apache played a key role in the initial growth of…

Continue Reading LIGHTTPD

cPHulk

  • Post author:

Security is the primary concern for every customer. Due to advancements in hacking methods and cyber technologies it is high time that we need to ensure the security of the…

Continue Reading cPHulk

DDoS

  • Post author:

Denial-of-service (DDoS) is a common cyber threat. It is an attempt to make a resource unavailable to the intended users. This is possible through temporarily interrupting or suspending services of…

Continue Reading DDoS

SELinux, a useful security mechanism

  • Post author:

Security-Enhanced Linux (SELinux) is a security mechanism implemented in the kernel and it provides Mandatory Access Control (MAC). The significance of SELinux lies in the fact that in its absence…

Continue Reading SELinux, a useful security mechanism