Shellshock Shellshock is a remote command execution vulnerability in BASH. The vulnerability relies on the fact that BASH incorrectly executes trailing commands when it imports a function definition stored into an environment variable. Slow Post A Slow POST attack sends a complete, legitimate HTTP POST header, which includes a Content-Length field to specify the size of the message body to follow. Slow Read A slow read attack is a type of DDoS (distributed denial of service) attack that sends legitimate application layer requests but reads responses very slowly. SOC 2 Compliance: Requirements, Process & Best Practices SOC 2 compliance refers to a framework for managing customer data based on five "trust service criteria". Sockstress Sockstress is an attack tool that exploits vulnerabilities in the TCP stack allowing an attacker to create a denial-of-service condition for a target server. SQL Injection: Examples, Real Life Attacks & 9 Defensive Measures SQL injection is a security vulnerability that allows attackers to interfere with the queries that an application makes to its database. The OSI Model: Breaking Down Its Seven Layers The OSI (Open Systems Interconnection) Model is a conceptual framework that standardizes and defines the functions of a telecommunication or networking system. URL Normalization URL normalization refers to when a URL that has been reformatted to ensure that documents that are denoted by multiple URLs will be indexed only once. Previous ... 13 14 15 16 17 18 Next 13 14 15
Shellshock Shellshock is a remote command execution vulnerability in BASH. The vulnerability relies on the fact that BASH incorrectly executes trailing commands when it imports a function definition stored into an environment variable.
Slow Post A Slow POST attack sends a complete, legitimate HTTP POST header, which includes a Content-Length field to specify the size of the message body to follow.
Slow Read A slow read attack is a type of DDoS (distributed denial of service) attack that sends legitimate application layer requests but reads responses very slowly.
SOC 2 Compliance: Requirements, Process & Best Practices SOC 2 compliance refers to a framework for managing customer data based on five "trust service criteria".
Sockstress Sockstress is an attack tool that exploits vulnerabilities in the TCP stack allowing an attacker to create a denial-of-service condition for a target server.
SQL Injection: Examples, Real Life Attacks & 9 Defensive Measures SQL injection is a security vulnerability that allows attackers to interfere with the queries that an application makes to its database.
The OSI Model: Breaking Down Its Seven Layers The OSI (Open Systems Interconnection) Model is a conceptual framework that standardizes and defines the functions of a telecommunication or networking system.
URL Normalization URL normalization refers to when a URL that has been reformatted to ensure that documents that are denoted by multiple URLs will be indexed only once.