I have found some rather disturbing messages built into the HTTP protocol like
I say disturbing because it is a security nightmare isn't it?
I had thought that the HEAD /page.html HTTP/1.1
request command would be harmless enough but then I came across: http://apache-range-exploit.com/
There is also supposed to be an OPTIONS request message that also fails to work on Apache servers.
Can anyone comment on this odd RFC 1226?
Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!
A Change in PHP Behavior with Session Write Short Circuit (http://php.net/manual/en/book.session.php#116217) (Winter 2014)**
With the release of PHP 5.6 the session handler changed in a way that many think should be considered a bug. See the note …
A few customers have recently asked my thoughts on Password Managers. As Security is a big part of our industry I was initially very hesitant and sceptical about giving a program all of my secret passwords. But as I was getting asked about them mo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…