Not every developers pay equal importance to web security and vulnerabilities, especially about cross site scripting when they start coding. Their primary goal is to get the project finished Websites developed with unsecure coding can be easily exploited by the attackers. There is no way your browser will prevent XSS automatically unless you disable your browser’s ability to run scripting languages such as JAVA script. Or only visit the sites that you trust. [Read more…]
This post aims to help you familiarize with the top 15 commonly known network and system security vulnerablitis. If you are a new administrator, you can have a look at the following list.
ACLs on the border router
The ACLs you place in your router, especially in the border router, should not allow inadequate access to your other devices connected to your router. A few misconfigured router ACLs can potentially allow information leakage through ICMP, IP, NetBIOS, and lead to unauthorized access to services on your DMZ server. So, make sure your border router has appropriate ACL in place in the right interface. [Read more…]