Squidoo Lenses by mggxx81 - Feed Preview

Here is the list of Squidoo lenses by Lensmaster mggxx81,
shown with descriptions, pictures and topics.

This list is also available as an RSS feed too - the URL for it is shown below:

Feed URL: http://squidutils.com/lensmaster/mggxx81.rss

1. Website Malware Detection
Website Malware Detection
Usually, it is not profitable to perform a targeted attack on a certain station simply to gain sensitive information or to make other sort of damage like DDoS (http://en.wikipedia.org/wiki/Denial-of-service_attack) for example. The successful attack, nowadays, is the one that installs a bot or ad...
Internet - Fri, 12 Sep 2014 00:13:11
2. How to use quttera web malware scanner api
How to use quttera web malware scanner api
For those who new to Application Programming Interface or API it would be better to spend some time understanding the basics. Detailed info can be found here . But in simple words, and to save the time of the reader, one can think about web API as a web service. The same way you get something by...
Internet - Fri, 12 Sep 2014 00:14:22
3. secure word-press blog from malware and exploits
secure word-press blog from malware and exploits
It would be fair enough to say that Word Press is one of the biggest and most popular platforms for blogging. This web software is used by tens of millions worldwide to create a website or blog for free. It provides thousands of themes and plug-ins to make your fresh website both look amazing and...
Internet - Fri, 12 Sep 2014 00:16:48
4. Blackhole exploit kit - the most popular web threat this year.
Blackhole exploit kit - the most popular web threat this year.
At the year 2012 approx. 30% of all web threats detected by Sophos and 91% by AVG originated from this exploit kit. Either by direct visiting or re-directions from compromised legitimate websites. This malware is exceptional due to various factors. First of all it is constantly updated with new ...
Internet - Fri, 12 Sep 2014 00:13:14
5. applications targeted by web hackers
applications targeted by web hackers
What are the most popular attack vectors and where to find the recent vulnerabilities? In a web-based environment the most attacked applications are those having direct or indirect relation to internet. The more exposure/ popularity has the application the more likely it will be aimed by the hac...
Internet - Fri, 12 Sep 2014 00:14:15

Updated: Fri, 28 Oct 2016 06:23:55 GMT -

« Back to export page.