by Ferenc Barta | Sep 26, 2017 | Security analysis
I’m quite sure that you have one of the small office/home office (SOHO) devices at home to share the Internet access for your computers, smartphones and IoT gadgets. These devices are really great, as they are capable of routing and address translation, they...by Ferenc Barta | Jul 14, 2017 | Security analysis
In the previous part of the article, we had looked at some incidents to better understand how attackers try to find SQL injection vulnerabilities. Instead of looking for other incidents, I’ve decided to write a short introduction about testing your own application...by Ferenc Barta | Oct 21, 2016 | Security analysis
Relational database, SQL, SELECT SQL is a language designed for the manipulation of relational databases and for the retrieval of information from that database. A relation most commonly looks like a chart, which can be, for example, an article. ARTICLES ID Title Text...by Ferenc Barta | Jul 6, 2016 | Security analysis
Part 2 Despite it’s disadvantages, using password-based authentication is still the most common way to identify users on the Internet. The biggest drawback of these methods is that they involve the users. People specify their login credentials whenever they register...by Ferenc Barta | Jun 15, 2016 | Security analysis
The idea Authentication methods have gone through huge development in the past few years and I believe that the spread of IoT devices will bring further advancement. Currently, however, the most widely used authentication method on the Internet is password-based...