Author: Warith Al Maawali
21/08/2013
/ Tech Blog
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+
Strengthening SSL and TLS Connections: A Step-by-Step Guide SSL (Secure Sockets Layer) is the technology used to encrypt and decrypt…
07/06/2013
/ Tech Blog
Sanitize data and prevent SQL injections in php
Importance of Data Sanitization in PHP: Preventing SQL and XSS Attacks The reason for adding this blog is that sometimes,…
03/06/2013
/ Tech Blog
How to protect your WordPress external links
Encrypting External Links on Your WordPress Blog As you may notice, all external links on my blog used to be…
01/06/2013
/ Tech Blog
The little secret on Digital Forensics
Exploring the Critical Field of Digital Forensics In this article, we delve into the critical subject of Digital Forensics, a…
17/05/2013
/ Tech Blog
Linux world the guide you need
Harnessing the Power of Linux Linux is a powerful and stable platform that enables us to perform a variety of…
13/05/2013
/ Tech Blog
Extracting SSL Fingerprints
Extracting SSL Fingerprints: My Custom Scripts I was looking for a script that can extract the SSL fingerprint from any…