Ketki's Blog on Web Security

?

Channel Reputation Rank

#1310
?

Activity Status

Stale

last updated

According to the data and stats that were collected, 'Ketki's Blog on Web Security' channel has a mediocre rank. The feed was last updated more than a year ago. The channel mostly uses long articles along with sentence constructions of the intermediate readability level, which is a result that may indicate difficult texts on the channel, probably due to a big amount of industrial or scientific terms.

About 'Ketki's Blog on Web Security' Channel

Security is the key, Let's secure it!

? Updates History Monthly Yearly
? Content Ratio
? Average Article Length

'Ketki's Blog on Web Security' provides mostly long articles which may indicate the channel’s devotion to elaborated content.

short

long

? Readability Level

'Ketki's Blog on Web Security' contains materials of advanced readability level, which are probably targeted at a smaller group of subscribers savvy on the subject of the channel.

advanced

basic

? Sentiment Analysis

'Ketki's Blog on Web Security' contains more negatively biased articles than positive or neutral ones (e.g. it may include some critical or negatively biased opinions on the subjects addressed on the channel).

positive

negative

Recent News

Unfortunately Ketki's Blog on Web Security has no news yet.

But you may check out related channels listed below.

Insecure Cryptographic Storage – OWASP Top 10 Vulnerability

[...] memory, overwrite it with random data, and use strong encryption to safeguard it Related Posts: OWASP Top Ten 2010 Web App Risks Insufficient Transport Layer Protection Broken Authentication – [...]

Cross-Site Request Forgery – OWASP Top 10 Vulnerability

[...] Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already [...]

Common Vulnerabilities in Configuration Files

[...] File Upload control, can be very harmful to your website Broken Authentication – OWASP Top 10 Vulnerability Cross-site scripting – OWASP Top 10 Vulnerability Don’t check &# [...]

Easy to Break, Easy to Plug – CAPTCHA Security

[...] here’s the vulnerable pseudocode: fixed psuedocode: Related Posts: Broken Authentication – OWASP Top 10 Vulnerability Is your password secure? Cross-Site Request Forgery – OWASP Top 10 [...]

Null Sessions Anatomy

[...] of characterizing an anonymous user and this is through the process of the NULL session. The NULL sessions are the unauthenticated sessions of the Server Message Block (SMB), which is the core network [...]

Remote File Inclusion

[...] an attack technique used to exploit “dynamic file include” mechanisms in web applications. When web applications take user input (URL, parameter value, etc.) and pass them into [...]

Failure to Restrict URL Access

[...] A common problem in web applications, failing to restrict URL access typically happens when a page doesn’t have the correct [...]

Stored XSS via File Upload

[...] Stored Cross-Site Scripting (XSS) is one of the major flaw in Web Applications, and it is also one of the difficult form of Cross-Site Scripting to be detected by [...]

Directory Traversal Vulnerability

[...] traversal attacks, directory climbing, and backtracking. Example of directory traversal: In web applications with dynamic pages, input is usually received from browsers through GET or POST request [...]

HTTP Response Splitting

[...] Vulnerability Cross-site scripting – OWASP Top 10 Vulnerability Programming an Unrestricted File Upload control, can be very harmful to your website Failure to Restrict URL Access [...]

Common Vulnerabilities in Configuration Files

[...] applications Related Posts: Tips to secure your computer or network Programming an Unrestricted File Upload control, can be very harmful to your website Broken Authentication – OWASP Top 10 [...]

Easy to Break, Easy to Plug – CAPTCHA Security

[...] ; OWASP Top 10 Vulnerability Insufficient Transport Layer Protection Programming an Unrestricted File Upload control, can be very harmful to your website [...]

Failure to Restrict URL Access

[...] Protection Cross-site scripting – OWASP Top 10 Vulnerability Programming an Unrestricted File Upload control, can be very harmful to your website [...]

Unvalidated Redirects and Forwards

[...] Reference Failure to Restrict URL Access Authorization Failure – OWASP Top 10 Vulnerability Cross-site scripting – OWASP Top 10 Vulnerability [...]

Common Vulnerabilities in Configuration Files

[...] , can be very harmful to your website Broken Authentication – OWASP Top 10 Vulnerability Cross-site scripting – OWASP Top 10 Vulnerability Don’t check “remember my password&# [...]

HTTP Response Splitting

[...] Redirects and Forwards Cross-Site Request Forgery – OWASP Top 10 Vulnerability Cross-site scripting – OWASP Top 10 Vulnerability Programming an Unrestricted File Upload [...]

Insecure Direct Object Reference

[...] Unvalidated Redirects and Forwards Insecure Cryptographic Storage – OWASP Top 10 Vulnerability Phishing, Vishing, Smishing [...]

Cross-Site Request Forgery – OWASP Top 10 Vulnerability

[...] Posts: OWASP Top Ten 2010 Web App Risks Authorization Failure – OWASP Top 10 Vulnerability Phishing, Vishing, Smishing HTTP Response Splitting Broken Authentication – OWASP Top 10 [...]

Remote File Inclusion

[...] is not executed using some wrapper, code in include files is executed in the context of the server user. This could lead to a complete system compromise. Running malicious code on clients: the [...]

?Key Phrases
Insecure Cryptographic Storage – OWASP Top 10 Vulnerability

[...] memory, overwrite it with random data, and use strong encryption to safeguard it Related Posts: OWASP Top Ten 2010 Web App Risks Insufficient Transport Layer Protection Broken Authentication – [...]

Cross-Site Request Forgery – OWASP Top 10 Vulnerability

[...] Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already [...]

Common Vulnerabilities in Configuration Files

[...] File Upload control, can be very harmful to your website Broken Authentication – OWASP Top 10 Vulnerability Cross-site scripting – OWASP Top 10 Vulnerability Don’t check &# [...]

Easy to Break, Easy to Plug – CAPTCHA Security

[...] here’s the vulnerable pseudocode: fixed psuedocode: Related Posts: Broken Authentication – OWASP Top 10 Vulnerability Is your password secure? Cross-Site Request Forgery – OWASP Top 10 [...]

Related channels