Skip to main content

Posts

Showing posts from July 10, 2011

Behind the scene of DTS-Enterprise

As you seen all of my tutorial I uses Virtualization Technology as seen in the screen-shot below and I use rdesktop in order to connect to the Windows machine from a Linux box. The Windows machine has the following software installed anti-virus and vmware. As you see in the screen-shot below it looks like if I installed a dedicated Linux server onto the machine.

[ Preventing XSS attacks ]

[ Preventing XSS attacks ]  In the video it illustrates three version of an XSS attack: high level, detailed with the script tag, and detailed with no script tag, and then recommends resources for further learning.  Cross-site scripting holes are web-application vulnerabilities which allow attackers to bypass client-side security mechanisms normally imposed on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page-content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-Site Scripting (XSS) attacks occur when: Data enters a Web application through an untrusted source, most frequently a web request. The data is included in dynamic content that is sent to a web user without being validated for malicious code. The malicious content sent to the web browser often takes the form of a segment of JavaScrip