Security

The path to a custom Firewall and a Content Security Policy on a Blog

Few years ago I found myself looking for a firewall. I've looked at various options from various security companies, but…

7 years ago

Creating a Secure Login Page

Login pages - they're everywhere. Almost every website has a login page - from big companies to discussion forums. In…

7 years ago

To padlock or not to padlock? SSL Explained

You visited a website, you saw a green padlock saying "Secure". Cool. But what does that actually mean? Does that…

7 years ago

Understanding & Mitigating Cross-Site Request Forgery (CSRF)

CSRF. Easy, enormously effective, frequently misunderstood. This attack can be called a sleeping lion because it is not taken as…

7 years ago

SQL Injection – What it is, how it works & how it can be mitigated

SQL Injection. If You're decently security-minded, You've probably heard of it. But what is it exactly? How does it work and,…

7 years ago

How I could have pwned my highschool (SQLi, CSRF, Hardcoded Passwords & XSS) – Part 1

Introduction It happened. Someone told me a website was invulnerable. Coincidentally, since it also happened to belong to a highschool,…

7 years ago