The form-based authentication scheme works in the following manner:

* A client generates a request for a protected resource (e.g. a transaction details page).
* The Internet Information Server (IIS) receives the request. If the requesting client is authenticated by IIS, the user/client is passed on to the Web application.
* If the client does not contain a valid authentication ticket/cookie, the Web application will redirect the user to the URL where the client is prompted to enter his credentials to gain access to the secure resource.
* On providing the required credentials, the client is authenticated/processed by the Web application.

Explore More

What is a stealth virus?

A stealth virus is a file virus. It infects the computer and then hides itself from detection by antivirus software. It uses various mechanisms to avoid detection by antivirus software.

Project: The Wifi Predator

Picture this: You find yourself sitting in a hotel room that does not offer wireless internet… As you look out the window, you spot that the three hotels & a

What is DNS hijacking?

DNS hijacking is the process of altering the name server records and redirecting the users to a bogus website. As everyone knows every domain name depends on its name server