Visit to Myanmar —-~_~—
March 24, 2010
0 Comments
Explore More
What is a rootkit?
For me, it is the evolution of the Trojan Horse concept. It is, in these days, a complete package of trojanized system utilities, with some interesting add-on programs, like specially
What are the security holes in the Basic Authentication scheme?
The Basic Authentication scheme uses the username and password and encrypts the password using base64 encoding. In spite of this, there are still many security holes in the Basic Authentication