Skip to main content

Posts

SQL injection: Basics - Tip for Developers Part 1/

  In many forums, and articles available on the internet you always find some articles about what called "dorks" which is a method used by attackers to identify the sql injection possibility on your sql app. Tip for Developers , after the setup of the Anti-DDOS procedures you should secure your code by some basics stuff if you see that something can be possible from the given example. Often using sql operate to a database system: Back-up procedures and the use of secure hardware are as important as comprehensive protection measures against external access, "So-called SQL injections", on the other hand, represent a great danger especially for classic relational database models and the information implemented there. What is an SQL injection? The term SQL injection refers to the exploitation of a security flaw in relational database systems that refer to the SQL language. The attacker uses data entered by the user on the database interface which is not s

Ransomware Prevention - Checklist 04/2023

  The authorities have always recommended not to give up & pay a ransom, “you may encourage attackers to target other organizations”, and there is no guarantee that stolen files will be recovered, so prevention is a best Tool , here is some checklists you must check in 2023 when you manage your work flow make sure you are using the right procedures. - Use Advanced Threat Intelligence - Implement Continuous Monitoring of Systems - Use Behavioral Analysis - Use 'Software-Defined' Perimeter - Use Zero-Trust Architecture - Security Orchestration & Automation Response - Implementing Browser Isolation or Virtual Browser Solutions - Spam Filters/Email Content Filtering - Implementing DNS Security - Use Security Information and Event Management systems Always keep monitoring & logs / backup procedures ON. WhiteHat Alliance Source : Discover The White Hat Alliance on Reddit https://www.reddit.com/r/White_Hat_Alliance/comments/12f7ey3/ransomware_prevention_chec

"Artificial Intelligence" Introduction ( Tips for CEOs )

Marketers use phrases like "AI" and "machine learning" to make their products smarter, but AI alone won't make software perform perfectly or ensure fit. The main question concerning AI tools is how the system will genuinely aid you in practice always. automatically to your particular demands and procedures from a platform.  1. Don't be "duped" by trendy terms. Yes 100% like "AI" and "machine learning" to make their products smarter, but AI alone won't make software perform perfectly or ensure fit. The main question concerning AI tools is how the system will genuinely aid you in practice always. automatically to your particular demands and procedures from a platform. The key is to make sure the tools you utilize truly offer the functionality you require while maintaining emphasis on the practical business benefits and competitive advantages you will derive from your usage of AI. 2. Encourage openness ,  Do not be afraid. AI i

UX Researcher - Job / Requirements

Today the earth discuss., " The Emergence of the infraweb and new consumption patterns have created new jobs " UX research tends to understand user expectations and barriers. Among them, that of UX researcher. It's a varied, exciting job, where you learn to question yourself in the broad sense, while cultivating an ability to listen actively and a keen sense of analysis according to the job description, So you wonder what are the differences with UX and UI design? What training, what roles to perform next and for what salary? I have to agree when the future candidate should participate in at least three or two open source communities as showcases in Infosec Field, I believe this task is not a worksheet job specially for large companies / organisation flow. Here are some examples to take as a requirement :  Conduct and evaluate quantitative and qualitative research. Primary and secondary user research. Marketing ethnographic research. Gather & analyze data. Work close

What is "CDN" ?

CDN "Content Delivery Network" doesn’t work as a web #hosting as it’s unable to host content or carry the capacity to cradle web hosting necessities.  However, at the network edge, assist in caching content, in turn, enhances website performance. A lot of sites have difficulty meeting their performance by utilizing only traditional hosting services this is why CDN's are Important! CDNs are a fast-rising solution to relieve a few primal issues that are present with traditional web hosting, such as preventing interruptions of services, and bettering overall security. How it Works ?  It is a high distributed platform with many servers which are separated technically and globally, the web content delivers to the end-user based on his regional location & the origin webpage. CDN Service is a good resolution for speeding the delivery of website content, "CDN" also increases traffic which leads websites to global & organic reach, the user gets the faster content

Q/A Cryptocurrencies - is it Legal , or Not ?

The Law Article codes on this date vary from one country to another, in Morocco it is not legal to carry out transactions according to the following regulations of 2017. According to Wikipedia  :  On November 20, 2017, Morocco's foreign exchange office declares that transactions carried out via virtual currencies constitute a violation of foreign exchange regulations, subject to sanctions and fines. The Library of Congress (LOC) conducts periodic reviews of countries' stances on Bitcoin and cryptocurrencies,  In November 2021 identified 103 countries whose governments directed their financial regulatory agencies to develop regulations and priorities for financial institutions regarding cryptocurrencies and their use in AML & CFT. The L.O.C also identified many countries that allow cryptocurrencies to be used. Several other countries allow Bitcoin to be used in transactions and have developed forms of regulation. Some examples are: - USA - United Kingdom - Israel - Australia