Technology Nuggets
-
How does an innocent looking interface element lead to such disastrous consequences like disclosure of credit card information, remotely controlling a machine, hijacking user identities and so on? Data becoming code via cleverly crafted payloads is one of the key security issues and is at the heart of many of the security attacks. Above thoughts
-
Authors: Chetan Giridhar, Rahul Verma Did it ever cross your minds how you could create a file that is hidden and not visible on the hard disk even with ‘Show hidden files and folders’ option enabled? Add to that, what if this hidden file doesn’t consume any space on your system and you could write
-
I co-authored an article with Durvesh Raut on WinDbg (Windows Debugger) for the Q3’2010 edition of Security Acts magazine. The article is an introduction to using WinDbg for user mode and kernel mode debugging and crash dump analysis on the Windows platform. Introduction (from the published article) Security testing has become an important part of