Penetration Testing

ActiveX Security Model

Abstract Modern browsers act as a thin client by executing untrusted or portable code called Mobile_Code. For example, windows media player too could be used to run a song file in the browser. However, it is a trusted code to be executed in browsers. Moreover, it becomes malicious when hackers run it without the consent of the end […]

Resource Usage and Management Policy

Abstract Resources of a company vital assets, therefore required to be utilized with great caution, as well as administered and monitored by a responsible entity. This article comprises of resource usages, such as a computer, networks, the internet, phone, software application, and management policy related contents to provide insight into the subject that might be […]

Authentication

Authentication is supposedly deemed to be the first line of defense in software’s, requires a combination of passkey from the end-user to manipulate the application further. Hence, the organization ought to incorporate the befitting authentication measures from grass root level in the form of policies into their logistics infrastructure to tighten the security of software […]

Scroll to top