by Manu Menon | Mar 25, 2024 | Latest, Outsourced Support
Software testing relies on verification and validation to ensure software meets design requirements and client expectations, respectively. While these terms are often confused, they play distinct roles in the testing process. This article delves into the importance...
by Visakh S | Mar 24, 2015 | Server Administration
A tech startup got in touch with us recently to evaluate their technology options for a SaaS application. It had a predominant e-commerce component, and the startup needed an easily maintainable, secure frame work to build their application. After considering all...
by dhanya | Aug 17, 2010 | Server Administration
Last week I spoke about SQL injection attacks used to try and gain access to the Administrative Interface on an application sever. This week I will be talking about three other methods used to try and do the same. Parameter Tampering: Parameter tampering is a form of...
by dhanya | Aug 10, 2010 | Server Administration
Last week I spoke about Session hijacking and methods to secure Authentication details. This week I will be talking about the various types of attacks that are used to try and gain access to the Administrative Interface on the target application server. Administrative...
by dhanya | Aug 3, 2010 | Server Administration
Nowadays more and more important data is stored in web applications. These applications expose customer information, financial data and other sensitive and confidential data over the internet. The number of transactions on the web has also increased tremendously. So...
Recent Comments