Solidmonster

?

Channel Reputation Rank

#420
?

Activity Status

Stale

last updated

According to the data and stats that were collected, 'Solidmonster' channel has an excellent rank. Despite such a rank, the feed was last updated more than a year ago. In addition 'Solidmonster' includes a significant share of images in comparison to the text content. The channel mostly uses long articles along with sentence constructions of the advanced readability level, which is a result that may indicate difficult texts on the channel, probably due to a big amount of industrial or scientific terms.

About 'Solidmonster' Channel

Think Secure Be Secure

? Updates History Monthly Yearly
JavaScript chart by amCharts 3.13.1Aug, 2020Sep, 2020Oct, 2020Nov, 2020Dec, 2020Jan, 2021Feb, 2021Mar, 2021Apr, 2021May, 2021Jun, 2021Jul, 202101Show all
? Content Ratio
JavaScript chart by amCharts 3.13.1ImagesLinksTexts
? Average Article Length

'Solidmonster' provides mostly long articles which may indicate the channel’s devotion to elaborated content.

short

long

? Readability Level

'Solidmonster' contains materials of advanced readability level, which are probably targeted at a smaller group of subscribers savvy on the subject of the channel.

advanced

basic

? Sentiment Analysis

'Solidmonster' contains texts with mostly positive attitude and expressions (e.g. it may include some favorable reviews or words of devotion to the subjects addressed on the channel).

positive

negative

Recent News
My Journey towards CISSP

Disclaimer! There is nothing extraordinary about this writeup. This is yet another person’s journey towards earning CISSP certification. Hope you will...

+
Top 5 server level vulnerabilities you must know!

Top 5 server level vulnerabilities you must know! You might have heard some these vulnerabilities irrespective of domain you are from. These are the...

+
Good To Go Live? [Part-1]

This post does not make you hacker overnight, or by this you cannot hack a website, this is not a shortcut to become a security tester. This article is...

+
Best Practices for Securing Forgot Password Feature

Recently, I authored an article at TestingCircus e-magazine and I like to publish the same on my blog so that I can reach out to my readers who are not...

+
Mobile App Testing at Test Insane Software Testing Services

The post Mobile App Testing at Test Insane Software Testing Services appeared first on SolidMonster.

+
Experience of Security testing on API’s

This blog post is all about my first experience with Security Testing on APIs. Back in 2013, I was working on a project “XYZ” in Moolya Software Testing...

+
Information Gathering (Footprinting)

Information Gathering/Footprinting is crucial in the whole process of penetration testing.More the information gathered about the target(application/user...

+
Information Security Myths

Do you think protecting a organization from bad guys is an easy task? not as easy as you/people think, indeed its a difficult task to handle. War between...

+
What is Social Engineering?

Hmmm. I decided to write this blog keeping aside my inhibitions, and I’m happy I am doing it, particularly, this one! Okay, I assume you would have heard...

+
Infographic: State of Security Testing by Nagasahas Dasa and Santhosh Tuppad

Infographic: State of Security Testing by Nagasahas Dasa and Santhosh Tuppad The post Infographic: State of Security Testing by Nagasahas Dasa and Santhosh...

+
Experience at Mozilla Summit 2013

It was May 21st Tuesday 2013, around 4:30AM IST.  I was on my bed struggling hard to sleep. I finally gave up and switched on my system to check my mails...

+

Unfortunately Solidmonster has no news yet.

What is Social Engineering?

[...] . Human beings are weakest links! Courtesy: http://socialengineeringattacks.blogspot.com Social Engineering is an art of wangling people to reveal confidential information which is not supposed to be [...]

Information Gathering (Footprinting)

[...] responds only on a particular network. 7.    One of the easiest and craziest way would be Social Engineering. It is an art of wangling people to reveal confidential information which is not supposed [...]

Experience of Security testing on API’s

[...] This blog post is all about my first experience with Security Testing on APIs. Back in 2013, I was working on a project “XYZ” in Moolya Software Testing. It all [...]

Infographic: State of Security Testing by Nagasahas Dasa and Santhosh Tuppad

[...] Infographic: State of Security Testing by Nagasahas Dasa and Santhosh Tuppad The post Infographic: State of Security Testing by [...]

Security Testing for Beginners

[...] an interface, and has simple commands to extract information from the database. The post Security Testing for Beginners appeared first on SolidMonster. [...]

Information Gathering (Footprinting)

[...] which I will be sharing in this post. Information gathering is not just one phase in security testing! Its an art where each one of us should be a master shifu at gathering relevant info for a [...]

Tutorial on SQL Injection

[...] Google in finding the sites which has possibility of having the application vulnerable using Google Dorks. What are Google Dorks? Google dorks or Google Operators are the center of attraction for [...]

Security Testing for Beginners

[...] tried to find out what they are. I referred to many articles and found that they are called as GOOGLE DORKS. I even came across some of the terminologies like White, Black and Grey hat hackers. During [...]

Good To Go Live? [Part-1]

[...] SQL query string used in a bound or parameterized query should never be dynamically built from user input. g) Terminate/abort invalid inputs: This is a safety and final strategy on unaccepted [...]

Tutorial on SQL Injection

[...] exploits security vulnerability in an application’s software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements [...]

Experience of Security testing on API’s

This blog post is all about my first experience with Security Testing on APIs. Back in 2013, I was working on a project “XYZ” in Moolya Software [...]

?Key Phrases
What is Social Engineering?

[...] . Human beings are weakest links! Courtesy: http://socialengineeringattacks.blogspot.com Social Engineering is an art of wangling people to reveal confidential information which is not supposed to be [...]

Information Gathering (Footprinting)

[...] responds only on a particular network. 7.    One of the easiest and craziest way would be Social Engineering. It is an art of wangling people to reveal confidential information which is not supposed [...]