Build your Own Network at Home | Learn Networking Series

Hey guys its not magic but its an indeed fact. It is a practice of communication between two or more computers with a very varied concept.It can be classified along with variety of concepts, right from basic to the very advanced classification. Networking is useful in sharing resources, communicating with each other, sharing information etc.

How To Defend An Input Validation Attack

defend input validation attacks

Input Validation Attacks: It is one of the very ‘easy to implement’ attack. It injects malicious scripts into an application and by running such application the system can be attacked and it becomes vulnerable. It is even hard to defend than passive attacks. Following are some of the best countermeasures against input validation attacks: Application

Passive Attack Gathering and the Tools Required

passive-attacking-gathering

Passive attack gathering is one of the Pre-attack stage where attacker collects information about his victim. It is also known as footprinting.This attack is done on big organization having very large network. It is the method by which we collect information about structure under organizational network. We sort of predict the flow of network by