Exploit

ActiveX Security Model

Abstract Modern browsers act as a thin client by executing untrusted or portable code called Mobile_Code. For example, windows media player too could be used to run a song file in the browser. However, it is a trusted code to be executed in browsers. Moreover, it becomes malicious when hackers run it without the consent of the end […]

Authentication

Authentication is supposedly deemed to be the first line of defense in software’s, requires a combination of passkey from the end-user to manipulate the application further. Hence, the organization ought to incorporate the befitting authentication measures from grass root level in the form of policies into their logistics infrastructure to tighten the security of software […]

Scroll to top