top of page
Search
The Tech Platform
Aug 22, 2022
The Dark Web: Why people Use it?
The dark web is the hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet...
The Tech Platform
Aug 4, 2022
Introduction to SQL Injection Attacks
SQL injection attacks pose a significant threat to web applications that rely on SQL databases. These attacks allow hackers to exploit...
The Tech Platform
Jun 3, 2022
Introduction to identity and access management?
Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of...
The Tech Platform
May 30, 2022
What is Multifactor Authentication and How does it work?
Multifactor authentication (MFA) is a security technology that requires multiple methods of authentication from independent categories of...
The Tech Platform
May 13, 2022
How does two step verification works
Two-factor authentication (2FA) is a security process in which users provide two different authentication factors to verify themselves....
The Tech Platform
May 12, 2022
Introduction to Security Token
A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a login...
The Tech Platform
Apr 26, 2022
What is Session Hijacking and How To Prevent It?
Session Hijacking When a Session is a time when you are on the internet, Session hijacking means an attack over your internet session and...
The Tech Platform
Apr 18, 2022
Go Application Vulnerability Cheatsheet
Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data...
The Tech Platform
Feb 10, 2022
Access Control List in Networking
An access control list is a list of objects; each entry describes the subjects that may access that object. Any access attempt by a...
The Tech Platform
Feb 3, 2022
Writing a Network Scanner using Python
What is a Network Scanner? A network scanner is a software tool that scans the network for connected devices. It is also used for...
bottom of page