what is assembly level programming language?

An assembly language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that are implemented directly on the physical CPU. Assembly languages generally lack high-level conveniences such as variables and functions, and they are not portable between various families of processors. They have the same … Read more

what is machine level programming language?

Machine language is the lowest-level programing language which is only understandable by computers. Which consists of binary or hexadecimal instructions which a computer can understand. Just as “10101001”. Kinda weird ha! As humans cannot understand the low-level language so we use high-level languages which are completely understandable by humans because of high-level languages are just … Read more

why java is secure?

Main focus in this post is the security features of the Java programming language. What makes java more secure than other languages?   1. Doesn’t use pointers as other languages do Programming languages- notably C/C++ languages- use pointer values to manage application memory and safeguard data against data thieves. Although these pointers are secure to … Read more

Why is the C language important?

The following list illustrates the importance the C programming language, in no particular order: The C language is small and relatively easy to learn. C compilers can produce highly efficient code. C compilers and cross-compilers are widely available for a large array of hardware targets, from tiny eight-bit microcontrollers to giant mainframes. The availability of … Read more

Understanding Linux Vulnerabilities

Vulnerabilities    and    attacks    against    Linux    are    creating    business    risks    in    a    growing number    of    organizations    —    especially    e-commerce    companies,    network    and    IT/security vendors,    and    cloud    service    providers    that    rely    on    Linux    for    many    of    their    systems, including    their    own    products.    When    Linux    systems    are    hacked,    the    victim organizations    can    experience    the    same    side    effects    as   … Read more

Cracking Phones and Tablets

I    don’t    envy    IT    administrators    and    information    security    managers    for    many    reasons    but especially    when    it    comes    to    the    bring    your    own    device    (BYOD)    movement    taking    place in    business    today.    With    BYOD,    you    have    to    trust    that    your    users    are    making    good decisions    about    security,    and    you    have    to    figure    out    how    to    manage    each   … Read more

Sizing Up Mobile Vulnerabilities

It    pays    to    find    and    fix    the    low-hanging    fruit    on    your    network.    That’s    where    you    get    the most    bang    for    your    buck.    The    following    mobile    laptop,    phone,    and    tablet    weaknesses should    be    front    and    center    on    your    priority    list: No    encryption Poorly    implemented    encryption No    power-on    passwords Easily    guessed    (or    cracked)    power-on    passwords For    other   … Read more

Understanding the Implications of Wireless Network Vulnerabilities

Wi-Fi    is    very    susceptible    to    attack    —    even    more    so    than    wired    networks    if    it’s    not    configured    or    deployed    properly.    Wireless    networks    have    long- standing    vulnerabilities    that    can    enable    an    attacker    to    bring    your    network    to    its    knees    or allow    your    sensitive    information    to    be    extracted    right    out    of    thin    air.    If    your    wireless network   … Read more

Putting Up General Network Defenses

Use    stateful    inspection    rules    that    monitor    traffic    sessions    for    firewalls.    This    can help    ensure    that    all    traffic    traversing    the    firewall    is    legitimate    and    can    prevent    DoS attacks    and    other    spoofing    attacks. Implement    rules    to    perform    packet    filtering    based    on    traffic    type,    TCP/UDP ports,    IP    addresses,    and    even    specific    interfaces    on    your    routers    before    the    traffic   … Read more