Mobile applications have started gaining more popularity than the native web application because of many reasons. Say for example, ease… Read More
This post is totally personal and not intended to make a comparison between proxy tools, moreover no intention of promoting… Read More
In the 3rd part of the blog series Certificate Authorities were discussed in depth. If anyone is here without reading… Read More
Facebook have introduced a new feature for mobile devices last month. The Facebook reaction sound. They will play a sound… Read More
In the second part of the series we have discussed about the SSL/TLS Key exchange in terms of Diffie Hellman… Read More
In the last part of the blog series we have discussed about the basic concepts of cryptography. It includes Hashing,… Read More
As a security enthusiast, I always fond of the working of SSL (TLS these days). It took me days to… Read More
Today in this blog post we will discuss deeply about the Robot exclusion standard or simply robot.txt. Probably you know… Read More
In the first part of the series, we have discussed the basics of a cookie. Recollecting the main points from… Read More
When I started studying about web applications, one of the topics where I spent a hell lot of time was… Read More