|
You are here |
blog.stevenlevithan.com | ||
| | | | |
parsiya.net
|
|
| | | | | [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications. | |
| | | | |
kersed.net
|
|
| | | | | [AI summary] This article explains Cross-Site Scripting (XSS) attacks, categorizing them into client-side vs server-side and reflected vs stored types, and provides defense strategies such as input validation, output encoding, and secure session management. | |
| | | | |
blog.gbrueckl.at
|
|
| | | | | [AI summary] The article explains how to calculate ISO 8601 week numbers and years in DAX and Power Query for data modeling. | |
| | | | |
www.weetechsolution.com
|
|
| | | Understand what cyber security is, the different types of cybersecurity solutions, and the importance of a consolidated cybersecurity solution | ||