Solidmonster

?

Channel Reputation Rank

#420
?

Activity Status

Stale

last updated

According to the data and stats that were collected, 'Solidmonster' channel has an excellent rank. Despite such a rank, the feed was last updated more than a year ago. In addition 'Solidmonster' includes a significant share of images in comparison to the text content. The channel mostly uses long articles along with sentence constructions of the advanced readability level, which is a result that may indicate difficult texts on the channel, probably due to a big amount of industrial or scientific terms.

About 'Solidmonster' Channel

Think Secure Be Secure

? Updates History Monthly Yearly
? Content Ratio
? Average Article Length

'Solidmonster' provides mostly long articles which may indicate the channel’s devotion to elaborated content.

short

long

? Readability Level

'Solidmonster' contains materials of advanced readability level, which are probably targeted at a smaller group of subscribers savvy on the subject of the channel.

advanced

basic

? Sentiment Analysis

'Solidmonster' contains texts with mostly positive attitude and expressions (e.g. it may include some favorable reviews or words of devotion to the subjects addressed on the channel).

positive

negative

Recent News

Unfortunately Solidmonster has no news yet.

What is Social Engineering?

[...] . Human beings are weakest links! Courtesy: http://socialengineeringattacks.blogspot.com Social Engineering is an art of wangling people to reveal confidential information which is not supposed to be [...]

Information Gathering (Footprinting)

[...] responds only on a particular network. 7.    One of the easiest and craziest way would be Social Engineering. It is an art of wangling people to reveal confidential information which is not supposed [...]

Experience of Security testing on API’s

[...] This blog post is all about my first experience with Security Testing on APIs. Back in 2013, I was working on a project “XYZ” in Moolya Software Testing. It all [...]

Infographic: State of Security Testing by Nagasahas Dasa and Santhosh Tuppad

[...] Infographic: State of Security Testing by Nagasahas Dasa and Santhosh Tuppad The post Infographic: State of Security Testing by [...]

Security Testing for Beginners

[...] an interface, and has simple commands to extract information from the database. The post Security Testing for Beginners appeared first on SolidMonster. [...]

Information Gathering (Footprinting)

[...] which I will be sharing in this post. Information gathering is not just one phase in security testing! Its an art where each one of us should be a master shifu at gathering relevant info for a [...]

Tutorial on SQL Injection

[...] Google in finding the sites which has possibility of having the application vulnerable using Google Dorks. What are Google Dorks? Google dorks or Google Operators are the center of attraction for [...]

Security Testing for Beginners

[...] tried to find out what they are. I referred to many articles and found that they are called as GOOGLE DORKS. I even came across some of the terminologies like White, Black and Grey hat hackers. During [...]

Good To Go Live? [Part-1]

[...] SQL query string used in a bound or parameterized query should never be dynamically built from user input. g) Terminate/abort invalid inputs: This is a safety and final strategy on unaccepted [...]

Tutorial on SQL Injection

[...] exploits security vulnerability in an application’s software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements [...]

Experience of Security testing on API’s

This blog post is all about my first experience with Security Testing on APIs. Back in 2013, I was working on a project “XYZ” in Moolya Software [...]

?Key Phrases
What is Social Engineering?

[...] . Human beings are weakest links! Courtesy: http://socialengineeringattacks.blogspot.com Social Engineering is an art of wangling people to reveal confidential information which is not supposed to be [...]

Information Gathering (Footprinting)

[...] responds only on a particular network. 7.    One of the easiest and craziest way would be Social Engineering. It is an art of wangling people to reveal confidential information which is not supposed [...]