Deprecated: Function create_function() is deprecated in /home/phototor/domains/phototor.com/public_html/wp-content/themes/premium-photography/inc/photo-widgets.php on line 3
Suman Tiwari Travellography, Cyber Security & Photography Blog | Clicks by Suman Tiwari, Articles on Cyber Security and Tourism | Page 3 Suman Tiwari Travellography, Cyber Security & Photography Blog – Page 3 – Clicks by Suman Tiwari, Articles on Cyber Security and Tourism

How to grow garlic at home

  Posted in Flora and Fauna on

  by Suman Tiwari

4

I am going to share the procedure which I have followed for growing garlic in my balcony. Garlic is very easy to grow. Even a novice gardener or someone who is having very little or zero gardening experience can grow garlic with ease. One can grow it indoor or outdoor. I have planted it in …

Emotet Outbreak

  Posted in Cyber Security on

  by Suman Tiwari

2

The Emotet banking trojan was first identified in 2014. Emotet was originally designed as a banking malware that attempted to sneak onto your computer and steal sensitive and private information. Later versions of the software saw the addition of spamming and malware delivery services—including other banking Trojans What is Emotet? Emotet is a Trojan that is primarily …

SQL Parameterized Query

This article is all about Sql Parameterized query What is Sql Parameters? Sql parameters are like program method parameters. We pass param to get filtered result.Example:“select * from teacher where name=”+ @name Here @name is parameter. This sql query will return data from teacher table where name will match to the specified value. Why we …

Most common flaws reported by Secure Static Code Analyser

Most common flaws reported by Secure Static Code Analyser

Below are the most common vulnerabilities reported by SAST tools like Veracode, Fortify, IBM Appscan Source and Checkmarx. Critical/ High  SQL Injection Directory Traversal Cross-Site Scripting (XSS) Insufficient Input Validation CRLF Injection Time and State Session Fixation Code Quality Encapsulation Information Leakage API Abuse Cryptographic Issues Credentials Management Command or Argument Injection Untrusted Search Path …

50 shades of Blue Whale!

  Posted in Cyber Security on

  by Suman Tiwari

 

1

50 shades of Blue Whale! “There are ‘n’ numbers of people living in this world who are alive but nothing more than a biological waste and I take the initiative to clean such wastes from society” says Philipp Budeikin a 21-year psychopath from Russia who invented the deadliest game called blue whale. Yes, it’s the …