Getting started with android Developement…

What is android?androiddev

Android is an operating system based on the Linux Operating System. it is a software bunch comprising not only operating system but also middleware and key applications.The project responsible for developing the Android system is called the Android Open Source Project (AOSP) and is primarily lead by Google.

The Android system supports background processing, provides a rch user interface library, supports 2-D and 3-D graphics using the OpenGL libraries, access to the file system and provides an embedded SQLite database.  

Android was developed by Android Inc, Android Inc was founded in Palo Alto of California, U.S. by Andy Rubin, Rich miner, Nick sears and Chris White in 2003. Later Android Inc. was acquired by Google in 2005. After original release there have been number of updates in the original version of Android. Android was unveiled in 2007 .

Read more »

Share on Facebook0Tweet about this on TwitterShare on LinkedIn0Share on Google+1Share on Reddit0Pin on Pinterest0Digg this

Is your CAPTCHA Strong enough !!

We have seen a lot of DoS (Denial of Service) attacks in recent times. An old but promising solution to DoS attacks in web applications is to have CAPTCHA implemented in the publicly available form/pages.  However, all CAPTCHA implementations are not quite safe, and some implementations would give the user a headache.

man image

There are recent developments on simplifying CAPTCHA- But on simplifying, some developers forget the purpose of CAPTCHA.
Well, what is the purpose of using CAPTCHA?

In simple words CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a program to 'ensure' that the user is a human.

Almost 80% of custom CAPTCHA implementations are found to be unsafe during our evaluations. So what all are the measures to make sure the application has safe and simple CAPTCHA?

Read more »

Share on Facebook0Tweet about this on TwitterShare on LinkedIn0Share on Google+1Share on Reddit0Pin on Pinterest0Digg this

iOS Mobile Application Security Assessment for Beginners

 1333190248_342008618_7-apple-i-phone-apple-i-pad-or-blackberry-mobile-repair-indiaWhy Mobile Application Security?

With the ever increasing penetration of Mobile apps into our day to day life, it’s imperative that Mobile Applications will be at the behest of hackers and Security professionals likewise.

Thanks to phenomenal advances in mobile device capabilities, everything from shopping, banking, recharge, booking tickets and many such activities are performed with the help of a smart phone alone. Hackers are finding more ways to steal data through mobile applications. 

Read more »

Share on Facebook0Tweet about this on TwitterShare on LinkedIn12Share on Google+1Share on Reddit0Pin on Pinterest0Digg this

Understanding and Testing Web Services – Part 1

V1sXtMost of the time folks find it really difficult to test web services. It is because we don't have proper knowledge of web services. Before any testing it is important to understand the system, we should know what can be the positive and negative sides of the technology and implementations of that application. Lets dive into the depth of web service testing. To provide a better security solution to the web service we should  have a brief understanding of web services, their architectural styles, their constraints and their characteristics that are responsible for their strength as well as weakness.

Read more »

Share on Facebook0Tweet about this on TwitterShare on LinkedIn13Share on Google+1Share on Reddit0Pin on Pinterest0Digg this

Shadows are there to protect your Passwords (How Shadow-Utils is storing your password in Linux)

Computers_Password_guessing_041153_

Our world would have been exponentially more peaceful if there was no fear of theft. We would’ve left our doors open but still enjoyed our privacy and security. Unfortunately looking at the current scenario, that’s a rather impossible fiasco. And hence the need for doors and locks.

A similar case is applicable for the digital world where we have to assure complete data security. The simplest yet most important way to protect ones data even today remains with the use of passwords and robust access management systems. 
 

Read more »

Share on Facebook0Tweet about this on TwitterShare on LinkedIn8Share on Google+1Share on Reddit0Pin on Pinterest2Digg this

No CAPTCHA reCAPTCHA

CAPTCHA-cartoonHow many times you feel affronted while reading those stupid numbers or words and re-entering it just to prove that you are a human. We call them CAPTCHA(Completely Automated Public Turing test to tell Computers and Humans Apart) and recommend it to avoid several kind of flooding attacks, brute force attacks and sometimes even for CSRF attacks.
It's time-consuming as well as frustrating.

Read more »

Share on Facebook0Tweet about this on TwitterShare on LinkedIn0Share on Google+0Share on Reddit0Pin on Pinterest0Digg this

SQL Injection- Not a Cup of Cake

What is SQL Injection:

I have gone through many SQL Injectioimagesn tutorials before writing this post. One thing was common at every place, the queries coming from the readers. Many people don’t know what actually SQL Injection is. They think that they can easily enter into the database and make some changes, or they can simply inject some query and will have the username and password of the administrator. Well !!! Till some extent the concept is true but it is not that much easy.

Read more »

Share on Facebook0Tweet about this on TwitterShare on LinkedIn0Share on Google+0Share on Reddit0Pin on Pinterest0Digg this