WWW
Are Secure Internet Transactions Really Secure?
This paper describes how many small business claim to be offering a secure order form, when in fact, they really are not. The paper shows how the insecurity occurs, and offers a fe…
Cgisecurity.com
This site is designed to help user to learn about what kinds of security risks exist and how to prevent them from happening.
CIAC: Unix NCSA httpd Vulnerability
An advisory detailing a vulnerability that has been discovered in the NCSA WWW server software (httpd).
Client Side Trojan
By clicking on maliciously formed HTML tags users can unknowingly perform undesirable actions.
Hacking Exposed: Web Applications
Book that covers how to hack web applications, and how to secure against the attacks detailed. Author profiles, links to tools referenced in the book and reviews.
Internet Explorer Automatic Web Script Form Filler
Software for automatic security and functionality testing of web sites. Record and replay your web surfing, form filling and downloading. Supports command line options via batch fi…
Microsoft TechNet Security - Web Site Security
Provides technical how to information and links to other security resources.
Phrack: Against the System - Rise of the Robots
Michal Zalewski theorizes how Web crawlers can be exploited to inadvertently attack remote systems.
Shockwave Security Alert
Lists potential privacy issues or security holes created by Shockwave and solutions for them.
The Open Web Application Security Project
How to build, design and test the security of web appplications and web services
The WWW Security FAQ
Includes securing your server, protecting confidential documents on your site, safe CGI programming, client security, and privacy.
Total Simplicity
Total Simplicity is a full on technical company providing hosting, custom programming, security, and online stores.
W3C Security Resources
Provides an overview of web security and links to security initiatives such as PICS Signed Labels, and XML-DSig.
Web Spoofing
Full text of a paper discussing an 'attack' that threatens both privacy and data integrity. Written by Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach. Available in v…
Showing 20–20 of 22 results