15 Sep

Using HTTPS protocol for your PHP web-site

If your provider has installed the certificate, then it's easy to do it.

More
13 Sep

Command injection

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application.

Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell.

More
04 Jul

Websphere issue: "Application already exists in the configuration repository"

Sometime developers may see this error when they try to install application into WebSphere server. The reason is old files in the temperary folders. What developer should do?

More