Deprecated: Function create_function() is deprecated in /home/phototor/domains/phototor.com/public_html/wp-content/themes/premium-photography/inc/photo-widgets.php on line 3
Suman Tiwari | Suman Tiwari Travellography, Cyber Security & Photography Blog | Page 3 Suman Tiwari – Page 3 – Suman Tiwari Travellography, Cyber Security & Photography Blog

SQL Parameterized Query

This article is all about Sql Parameterized query What is Sql Parameters? Sql parameters are like program method parameters. We pass param to get filtered result.Example:“select * from teacher where name=”+ @name Here @name is parameter. This sql query will return data from teacher table where name will match to the specified value. Why we …

Most common flaws reported by Secure Static Code Analyser

Most common flaws reported by Secure Static Code Analyser

Below are the most common vulnerabilities reported by SAST tools like Veracode, Fortify, IBM Appscan Source and Checkmarx. Critical/ High  SQL Injection Directory Traversal Cross-Site Scripting (XSS) Insufficient Input Validation CRLF Injection Time and State Session Fixation Code Quality Encapsulation Information Leakage API Abuse Cryptographic Issues Credentials Management Command or Argument Injection Untrusted Search Path …

50 shades of Blue Whale!

  Posted in Cyber Security on

  by Suman Tiwari

 

1

50 shades of Blue Whale! “There are ‘n’ numbers of people living in this world who are alive but nothing more than a biological waste and I take the initiative to clean such wastes from society” says Philipp Budeikin a 21-year psychopath from Russia who invented the deadliest game called blue whale. Yes, it’s the …

Ransomware attack called WannaCry

  Posted in Cyber Security on

  by Suman Tiwari

Ransomware attack called WannaCry

Quick walk-through of Ransomware attack called WannaCry Ransomware is a malicious software/malware that encrypts the files/folders and locks device (computers, Laptops, smartphones and then demands a ransom money to unlock it. Ransomware named ‘Wannacry’ has affectted numerous computers worldwide and had created the biggest ransomware attack the world has ever seen till date.   Note …

Cool method to Track your lost android device

Cool method to Track your lost android device We are so well connected to our gadgets like cellphone that for most of us losing a phone is like losing a body part. This article Is a quick guide on how to track your lost android device (Phone or tablet/phablet) with google account. Most of us …