TechTutorials - Free Computer Tutorials  







Security






Tutorials (44)

Total Tutorials: 6548  |  Added today: 0 Tutorials updated: 01/16/2018



Sort Tutorials By:


.htaccess Guide And Tools
 
Includes and introduction to using .htaccess and tools to create .htaccess and .htpasswd files automatically. Tutorial includes blocking IP's, user/pass authentication, preventing hotlinking and more.
Added: 03/03/2003, Hits: 984, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

A matter of trust or is it?
 
Who do you know who you are really dealing with when disclosing your personal / credit card details over the Internet? This explains the current methods available for proving the identity of a web site and explains why they fail. It offers an alternative solution to the problem of web site authenticity.
Added: 03/13/2003, Hits: 876, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Alternative to CAPTCHA
 
At first CAPTCHA was a lifesaver, dramatically reducing the time webmasters had to spend deleting spam posts and registrations. Not surprisingly, the spammers found a way around it using computer character recognition software rendering CAPTCHA nearly worthless (in most cases). This short tutorial will explain a new system that works much better.
Added: 03/10/2007, Hits: 923, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Are Free/Low Cost Web Apps Secure Enough for Business? - Part 1: Google Apps
 
In this two-part article, we’ll take a look at web apps from a security point of view.
Added: 11/19/2010, Hits: 626, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Authentication - who's site is it really?
 
Whilst a lot of work seems to have been done on personal authentiction, little or no work has been done about web site authentication to users. Users should be just as entitled to authenticate web sites as web sites are to authenticate them.
Added: 03/13/2003, Hits: 903, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Basic PHP Security
 
An introduction to some of the directives in the php.ini file that can help secure your server and prevent attacks.
Added: 01/23/2008, Hits: 997, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Configuring htaccess
 
Learn how to password protect sensitive areas of your website with htaccess and htpasswd.
Added: 11/30/2000, Hits: 918, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Controlling Spiders With Your Robots.txt File
 
Learn the importance of the robots.txt file and how to use it to control search engines and spiders.
Added: 04/02/2005, Hits: 920, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Cryptography and SSL Tutorials by Herong
 
This free book is an excellent tutorial book for beginners. It is a collection of notes and sample codes written by the author while he was learning cryptography himself. Topics include Blowfish, CA, certificate, certification path, cipher, cryptography, CSR, decryption, DES, encryption, Java, JCE, JDK, OpenSSL, PEM, private key, public key, RSA, sample codes, secret key, self-signed certificate, SSL, X509.
Added: 01/27/2006, Hits: 1,044, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Digital Signatures
 
In this article I will clarify what a digital signature is and will demonstrate ways of using this technology to validate the identity of a user. The internet is filled with fraudulent villains that can take you or your organization to the cleaners, without you even knowing about it till it's too late.
Added: 06/09/2004, Hits: 1,131, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Does SSL protect you, or is it a condom that is open at both ends?
 
For the last five or so years, SSL has been paraded as the technology that secures the Internet. All you have to do is look and see the padlock on the bottom of the screen and you can be sure it’s safe. Is it true?
Added: 03/13/2003, Hits: 783, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

E-Commerce Risk
 
For some reason, consumers seem to place less trust in the security of their information on the Internet than they do when calling a toll free number or placing an order by regular snail mail.
Added: 08/04/2000, Hits: 914, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Fighting Guest Book and Community Forum spammers
 
The growing problem of inappropriate spam links in our public feedback pages and what you can do about them!
Added: 03/19/2002, Hits: 912, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How Do I Get A Certificate
 
Operating a secure server addresses two issues: proving that you (the server operator) are who you say you are, and preventing data from being intercepted and decoded by a less than nice person.
Added: 08/04/2000, Hits: 857, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How Do I Get A Secure Server
 
You options are basically limited by how you run your site. If you are virtually hosted, then you can see if your host provides SSL or secure server hosting. If you have your own server, then you can either modify or use your existing server software.
Added: 08/04/2000, Hits: 869, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How do you deal with Internet fraud?
 
Covers fraud that uses Internet technology as an integral part of the fraud and fraud that is already taking place by other means where the Internet is merely another method of delivery.
Added: 03/13/2003, Hits: 812, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How Does A Secure Server Work
 
Unlike requesting a regular (http) web page or script, the browser and server must go through a few gyrations before anything can happen of interest to the reader. Here is a simplified outline of how the SSL connection is made.
Added: 08/04/2000, Hits: 829, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How To Install A Comodo SSL Certificate On Your Web Server
 
This tutorial will show you how to install a Comodo SSL (Secure Sockets Layer) Certificate on your web server. Your customers will know that their transactions are safe and secure, when they see a padlock icon near the bottom of their web browser. They will also feel confident knowing that you are protecting, and encrypting their personal information, before they make a purchase from your website.
Added: 05/16/2012, Hits: 477, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Is your website hackable? Why you need to worry
 
Prominent hacking episodes of December 2006 and much needed statistics on web application hacking.
Added: 03/16/2007, Hits: 870, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

It can't be fraud - or is it?
 
Bad commercial behaviour and practice may be no different from fraud as far as the customer is concerned. Taking money before making 'arbitrary’ decisions about supplying goods or services may not be technically fraud because that requires deception to be deliberate. However, the physical world provides the customer with the ability to gain some remedy easily but the Internet does not.
Added: 03/13/2003, Hits: 804, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Page:  1 2 3   Items Per Page:







7 Seconds Resources, Inc.




IT Showcase