Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

Core Defense Mechanisms

Tutorial Website 

Handling Attackers

April 14, 2020 Krishna Alerting Administrators, attackers, Core Defense Mechanisms, Handling Errors, IP address, Maintaining Audit Logs, scripted attack, security-critical applications

Anyone designing an application for which security is remotely important must work on the assumption that it will be directly

Read more
Tutorial Website 

Handling User Input

April 14, 2020 Krishna “Accept Known Good”, “Reject Known Bad”, application performing input validation, Approaches to Input Handling, Boundary Validation, Core Defense Mechanisms, HTML mark-up, Safe Data Handling, Sanitization, Semantic Checks, Varieties of Input, web application

Recall the fundamental security problem described in Chapter 1: all user input is untrusted. A huge variety of different attacks

Read more
Tutorial Website 

Handling User Access

April 13, 2020 Krishna Access Control, attack surface, Authentication, Core Defense Mechanisms, enforcing access control, enforcing session timeout, Handling User Access, HTTP request, security vulnerabilities, Session Management, typical login function, URL query, web application

A central security requirement that virtually any application needs to meet is to control users’ access to its data and

Read more
Tutorial Website 

Core Defense Mechanisms

April 13, 2020April 13, 2020 Krishna Core Defense Mechanisms, Handling Attackers, Handling User Access, Handling User Input, Managing the Application

The fundamental security problem with web applications — that all user input is untrusted — gives rise to a number

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.