DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modern Digital Website Security: Prepare to face any form of malicious web activity and enable your sites to optimally serve your customers.

Low-Code Development: Learn the concepts of low code, features + use cases for professional devs, and the low-code implementation process.

E-Commerce Development Essentials: Considering starting or working on an e-commerce business? Learn how to create a backend that scales.

Getting Started With Jenkins: Learn fundamentals that underpin CI/CD, how to create a pipeline, and when and where to use Jenkins.

Avatar

Ian Muscat

[Deactivated] [Suspended]

Works at @ianmuscat

Joined Apr 2017

Stats

Reputation: 753
Pageviews: 403.7K
Articles: 11
Comments: 0
  • Articles

Articles

article thumbnail
Mitigate Slow HTTP GET/POST Vulnerabilities in the Apache HTTP Server
Learn how you can mitigate slow HTTP GET/POST vulnerabilities in the Apache HTTP Server.
June 26, 2019
· 16,193 Views · 1 Like
article thumbnail
What Is Path Traversal?
An attack where an attacker may trick a web app into reading and divulging the contents of files outside of the root directory of the app or the web server. Scary stuff!
December 15, 2017
· 11,660 Views · 1 Like
article thumbnail
Cross-Site Scripting in HTTP Headers
Cross-Site Scripting (XSS) is one of the most common vulnerabilities on the web. Learn how you as a developer can guard against it.
September 4, 2017
· 20,117 Views · 5 Likes
article thumbnail
Out-of-Band XML External Entity (OOB-XXE)
We wrap up our series on XXE vulnerabilities and discuss how hackers can use OOB-XXE to steal data from the victims' system.
July 21, 2017
· 9,731 Views · 0 Likes
article thumbnail
XML External Entity (XXE) Limitations
We continue our series on XML External Entity attacks, by looking at some typical situations for XXE attacks, and the limitations and shortcomings of this attack.
July 20, 2017
· 15,950 Views · 1 Like
article thumbnail
SQLi Part 3: In-Band, Inferential, and Out-of-Band SQL Injection
We continue on with our series on SQL injection by exploring the three main types of SQLi attacks and how cyberattackers tend to use them.
June 2, 2017
· 31,440 Views · 2 Likes
article thumbnail
What Is Server-Side Request Forgery (SSRF)?
SSRF attacks are no fun and need to be accounted for in any web-facing application. In this post we take a look at what they are and what you can do to help prevent them.
May 22, 2017
· 12,499 Views · 2 Likes
article thumbnail
What Is Email Header Injection?
We've all heard of emails being vectors for attacks, but what exactly is email header injection, how can it be mitigated? We take a look at these questions in this post.
May 12, 2017
· 18,043 Views · 9 Likes
article thumbnail
What Is a Host Header Attack?
Read to learn what a host header attack is, how to defend against a host header attack, and what kinds of vulnerabilities these attacks seek out.
May 10, 2017
· 74,731 Views · 8 Likes
article thumbnail
What Is Local File Inclusion (LFI)?
In this article, we discuss a Hollywood-type hack, Local File Inclusion, in which an attacker can trick your web app into including malicious files.
April 29, 2017
· 12,576 Views · 1 Like
article thumbnail
What Are Injection Attacks?
In the world of security, it's important to know what you're up against. In this post, we've provided a list of the most common and dangerous web attacks.
April 26, 2017
· 33,982 Views · 4 Likes

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: