No Image

A Phishy Story

November 5, 2009 Taufiq Ali 0

Phishing sounds similar to fishing. Fishes are to the volume of internet users today much like fishermen are to phishers. Zillions of fishes falling prey the nets is nothing less [more]

No Image

SQL Injection in Stored Procedure & Preventing from the same

September 30, 2009 Dhiraj Ranka 0

Following is the small example of creating a stored procedure. ==================================================================== CREATE PROC sp_login (@loginid nvarchar(25),@password nvarchar(25)) AS DECLARE @SQLString VARCHAR(500) DECLARE @loginid VARCHAR(64) DECLARE @password VARCHAR(64) /* Build the [more]

No Image

Infosec Scenario in 2009

January 1, 2009 Lionel Faleiro 1

1. Business continuity to get focus over disaster recovery BCM is a process issue related to building the framework to increase business resiliency and restoration capability, while DR is about [more]