List of hacking types you should be protecting your website / portal against – Part 1

Comprehensive List of Website Hacking Types (100+) sourced from ChatGPT SQL Injection Blind SQL Injection Boolean-Based SQL Injection Time-Based SQL Injection Error-Based SQL Injection Cross-Site Scripting (XSS) Reflected XSS Stored XSS DOM-Based XSS Cross-Site Request Forgery (CSRF) Clickjacking Remote File Inclusion (RFI) Local File Inclusion (LFI) Directory Traversal Session Hijacking DNS Spoofing Man-in-the-Middle (MITM) Attack…… Continue reading List of hacking types you should be protecting your website / portal against – Part 1

Security best practice, patterns & architecture links from AWS, GCP & Azure – Part 1

Herewith I am providing a curated list of links for security best practices, patterns & architecture for AWS, GCP & Azure – Part 1. AWS: Security – AWS Well-Architected Framework (amazon.com) AWS Security Reference Architecture (AWS SRA) – AWS Prescriptive Guidance (amazon.com) AWS Security Documentation (amazon.com) Security, identity, compliance – AWS Prescriptive Guidance (amazon.com) Cloud…… Continue reading Security best practice, patterns & architecture links from AWS, GCP & Azure – Part 1

Security tips for Google Drive & Android

Google Drive: Open Google Drive on web based browser like Chrome On each of the folders if you see a person symbol it’s shared, if you don’t see the symbol its not shared For each folder -> click SHARE -> Advanced -> Check which user has view rights and which user has edit rights ->…… Continue reading Security tips for Google Drive & Android