Monday , February 27 2017

PHP and the include exploit

Today, we will explore the include exploit with PHP. We will see how it allows accessing files on the web server and how it allows executing distant scripts. Finally, we’ll see how it is possible for developers to get rid of this problem. What is the include exploit ? In …

Read More »

Tor and anonymity

In the today’s article, we will talk about Tor and how it can provide people with a better anonymity on the web. In this purpose, we will see what it is used for, how it works and what are the hidden services. Finally, we will talk about the known attacks …

Read More »