Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Saturday, April 30, 2022

Rise of the AI and ML Era and Privacy Concerns

Rise of the AI and ML Era and Growing Privacy Concerns

I'm no conspiracy theorist like certain CEOs out there but I believe that this whole machine learning (ML) technology could be used with both good and bad intentions if we're not too careful with who we release the technology to. Machine learning has potential to learn our social behaviors and essentially replace our cyber presence. It also has good intensions to be used as a marketing tool to improve sales of a under utilized product as one could hope it to be used.

Tuesday, March 6, 2018

ASIAN, Inc. Fraud Page

Hey come check out this page on Cyber Crime and Fraud Protection that me and my team put together on ASIAN, Inc.. Learn about the different ways you could be taken advantage of and how hackers operate to get there hands on your personal data.

ASIAN, Inc. Fraud Page

Sunday, January 17, 2016

Lifelock Personalized Security

Lifelock is the way to get piece of mind through a time of fraud. When your identity is on the line and credit card companies are holding you liable Lifelock has your back. Please visit this link if interested. http://www.lifelock.com/refer/48791052/Jaswinder/

Monday, September 12, 2011

A Cryptic Approach To Cryptography

Its been a while since my last post. Ive got two posts sitting in my draft since February. I'm a little behind on I thought I would give some advice about Cryptography.

Scenario
Lets say that you have a list of passwords and usernames stored in a db generated from your web/intranet app. If your like me, you only want the best in security for your users. So you go shopping for encryption technology.

Wednesday, May 12, 2010

Windows Security Fail!!!! lol

Kernal Hook Bypass Engine - Got to love Windows on security issues its like opening a can of worms lmao

Monday, March 1, 2010

Validating by White List approval

White listing refers to having input compared to an approved list and then rejecting what ever isn't on it. Like when you go to a concert and you are trying to get backstage, if you're name isn't on the VIP list or you don't have a pass you cant get in. In this instance, your name is compared to the list of valid people allowed backstage. If your name doesn't appear you tossed aside. Sucks right but when your talking about building a web app it can be one of the methods that separate you from being attacked.

Wednesday, February 17, 2010

PHP Protection from XSS attacks

If you have a forum, or blog hosted on your site. Then you should be aware of cross site scripting vulnerabilities that any basic HTML form can produce. I will show you how the vulnerability exists, how to detect it, and how to mitigate this form of attack.


What is an Cross-Site Scripting (XSS) Attack?

Cross site scripting vulnerabilities are produced when a web site displays unfiltered user generated input on to the site. By allowing users to supply their own content, hackers can figure out ways to get malicious content on the website by injecting it with their own scripts via javascript and change the