Tag: Security

Articles Jul 10, 2009

4 tips to stay secure on a wireless network

Wireless networks have become a necessity and an essential part of any computing environment. They provide portability and versatility to your network usage. But when...

Database Jan 31, 2009

SQL Injection – 1 (Introduction)

In this post we shall discuss a very common method of hacking a website (or rather, a database) called SQL Injection. The object of this...