Cambridge Certified Linux Associate ( CCLA ) – Year 2004 to 2006 Sl.No Name Country Score CIU ID 1 Andre M USA 100 CIU-CCC-47426 2 Jonathan Yaniv Canada 86 CIU-CCC-47466 3 Retheesh Kumar India 84 CIU-CCC-47496 4 Shiraz INDIA 82 …
Cambridge Certified Datacom Associate ( CCDatacom ) – Year 2004 to 2006 First Name Second Name Date CIU ID Peter Yimga Chuba 12/27/2004 CIU-CCC-45138 Ahmed Ezz El Din Fathy 2/22/2005 CIU-CCC-45160 MUHAMMAD ADNAN SHAUKAT 7/26/2006 CIU-CCC-45228 Rafif Syahputra Pasaribu 9/3/2005 …
Cambridge Certified Database Associate ( CCDA ) Certified – Year 2004 to 2006 First Name Country / Job Score CIU ID Mahesh Ravindran Database Administration 80 CIU-CCC-48438 Muhammad Kawish Siddiqui Database Administration 76 CIU-CCC-48439 Muhammad Kawish Siddiqui Oracle Database …
Technology Incubation Center CIU Certified Professionals Year 2007 Name Second Name Country / City CIU ID REA BELFON PORT OF SPAIN CIU-CCC-49565 NAGESH KARALE NAVI MUMBAI CIU-CCC-50912 DE AZLIN RICK SINGAPORE CIU-CCC-51119 A R SUBRAMANIAN Chennai CIU-CCC-50442 Aamir Iftikhar Rawalpindi …
TYPES OF ATTACK SYN FLOOD : They are concept-based Denial of Service attacks and rely on the 3 way handshake, filling up a table known as the TCB. TCB or the Transmission Control Block is a transport protocol data structure that …
Denial of Service Attacks A denial of service attack (also known as DoS) is an attempt to make a device (computer or any other device attached to a network) unavailable by either completely shutting it down or making it slow, …
Twitter allowed deletion of a user’s address book, by the user, with just a click of a single click URL. However, Twitter didn’t check if the request came actually from the user, or the user has been tricked to visit …
Exploiting CSRF In most cases, an attacker would use something that would automatically send a request as soon as the attacker views that particular webpage. An attacker would post a message on the community discussion board, using the following code …
Cross-Site Request Forgery is a web-based attack, in which an attacker could launch an action on behalf of an authenticated user, without the user “actually” performing it. This vulnerability According to OWASP, “A CSRF attack forces a logged-on victim’s browser …
POST METHOD XSS Cross-Site Scripting attacks could also be triggered when the data is being sent with a POST method instead of the usual GET. We can use a Firefox add-on named “Tamper Data” or any other packet sniffer to …