Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 61 to 70
RTS Threshold Configuration For Improved Wireless Network Performance [Updated 2020]
3rd Aug 2020 [2 months ago] from InfoSec
In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings to...Go on to the site to read the full...
Bypassing Security Products Via DNS Data Exfiltration
3rd Aug 2020 [2 months ago] from InfoSec
Introduction  Criminals are using different strategies to compromise computer networks, infrastructures and organizations. Cyber incidents have increased in number and complexity since the...Go on to the site to read the full article
Data Loss Protection (DLP) For ICS/SCADA
31st Jul 2020 [2 months ago] from InfoSec
Introduction Data loss prevention (DLP) is a strategy that seeks to avoid the deletion, corruption or leakage of confidential or proprietary data stored on company devices, networks and servers....Go on to the site to read the full...
App Isolation In Windows 10
31st Jul 2020 [2 months ago] from InfoSec
What is app isolation in Windows 10? Suppose you want to install and run a new program on Windows but you think it may be risky and may harm your system. You want a safe way to isolate and run this...Go on to the site to read the full...
How To Use Radare2 For Reverse Engineering
31st Jul 2020 [2 months ago] from InfoSec
Introduction This article defines reverse-engineering as it is used in the analysis of software. We will explain in detail how to use radare2 for reverse engineering. It exposes techniques that can...Go on to the site to read the full...
Windows Supported Wireless Encryption Types
31st Jul 2020 [2 months ago] from InfoSec
Introduction We all want to keep our wireless network secure, to keep our personal data and information safe, dont we? Fortunately, Windows supports multiple wireless encryption types. You, as...Go on to the site to read the full...
Configuring DNS In AWS
31st Jul 2020 [2 months ago] from InfoSec
Introduction The Domain Name System (DNS) is necessary for routing traffic across the internet. It accomplishes this task by converting easily remembered domain names (example.com) into the IP...Go on to the site to read the full...
How To Use Assigned Access In Windows 10
31st Jul 2020 [2 months ago] from InfoSec
What is Assigned Access? Suppose you would like a user to use only one application on Windows OS. If this is a requirement, then the first thing which should come to your mind is the Assigned Access...Go on to the site to read the full...
HTTP-based Vulnerabilities
30th Jul 2020 [2 months ago] from InfoSec
Introduction to HTTP and HTML vulnerabilities Web applications are commonly targeted by cybercriminals. The combination of public exposure and potential access to sensitive data makes them easily...Go on to the site to read the full...
Cross-Site Request Forgery (CSRF) Vulnerabilities
30th Jul 2020 [2 months ago] from InfoSec
Introduction to cookies and user authentication Cross-site request forgery (CSRF) vulnerabilities are designed to take actions on a website on behalf of an authenticated user. Accomplishing this...Go on to the site to read the full...
« Newer 2 3 4 5 6 7 8 9 10 11 Older »