Posted on May 25, 2017 by Yury Sergeev
Popular CMS are always under attack. To keep your online business secure, you should always be aware of high-risk web vulnerabilities. Today, it is crucial to know how to mitigate the vulnerabilities which may harm the income.
Posted on January 04, 2017 by Yury Sergeev
Posted on October 18, 2016 by Nikolay Arefiev
When you use the Internet for your business, you are confronted with a task of protecting your Internet resource. Some small Internet-based companies believe that if they don’t store the customer payment information at their web resource, no hacker attack can significantly harm their business. However, nowadays there are exist attacks that indirectly influence all participating parties, even though your resource may not have been the target of the attack.
Posted on September 18, 2016 by Yury Sergeev
NGINX is an extremely popular web server that can handle high volumes of web traffic. Each client connection might be logged and you can control which information to store. Sometimes, it is essential not only to save remote IP address, user agent or status but also store a body of requests, especially POST requests. For instance, POST data can be really useful to be analysed if you want to ensure that your server is secured enough because the most of the attacks are sent by this type of HTTP requests. However, some POST headers may contain sensitive data such as passwords and therefore it is essential to have a making method.
Posted on August 14, 2016 by Nikolay Arefiev
The task of website analysis for promotion in different search engines is usually solved by the means of various online services and software products. It is better to use a mashup approach, when you get all results of the web server log analysis on the same platform, thus eliminating the need to buy a set of various software products or pay for multiple online services.
Recent PostsUnpathed Critical Vulnerability in Magento