Log Analysis | How Log Analysis work? | Log analysis methods | Purposes of log analysis
Introduction
Log Analysis is the process of analyzing the data generated by system, software activities stored in the form of log data. Log data include each and every activity done in a system, network, software or hardware. Most of the log are automatically generated in OS and in case of web application log are generated in server as defined by the developer. Log analysis helps in tracking unusual beh
....Read More
Client-Side Validation:
Customer Side approval is done on the program on which client is entering information in the frame which are started from server side. These are basically done through JavaScript for the information which is entered.
Server-side validation
Server-Side Validation is done on server where application is put away and got to. This approval is done to shield application from the client who sidesteps the approval from the customer side and attempt to hurt inner application.
....Read More
Last November, I was one of 9.4 million people to receive an email from Cathay Pacific, warning me that my data was stolen. The airline, which saw its share price take a beating due to this data breach, kindly warned me to be alert for phishing emails that attempt to scam me.
You may think you are safe because you haven't flown on Cathay Pacific, or British Airways, or done business with any of the global companies that recently reported data breaches. You are not.
None of Malaysia's
....Read More
Google has taken a huge decision to shut down google plus due to it's security flaw that leave users data exposed to the outer world. A bug had been discovered in the system which led even the third-party developers to access the data without the knowledge or permission of the user.It is said that the data leak affected around 500,000 user accounts. The bug could have led to around 440 different third party applications to have access to the private user information.
It could be due to
....Read More
Cyberstalking is a form of harassment that involves the internet and other uses of electronic communication. When modern technology is used to threaten, harass, embarrass, or slander the victim's character, this is cyberstalking. Keep in mind that cyberstalking involves unwanted contact of some sort. The contact is not limited to online communication, it can also be multiple harassing text messages sent to the victim. Yes, cyberstalking is a crime and every state is different and varies in t
....Read More
Introduction
Digital Signature is a digitally generated code to identify the ownership of the document while working with digital devices. In another word, it can be defined as the process which guaranteed the content of the message cannot be altered on transit. The signature provided to a content is uniquely identified by a hash key. The hash key is generated by applying algorithm like RSA. RSA is an algorithm used to encrypt and decrypt the content/message by the modern computer. The digital
....Read More