Via CMSWire -
We hear the same terms bandied about whenever a popular site gets hacked. You know… SQL Injection, cross site scripting, that kind of thing. But what do these things mean? Is hacking really as inaccessible as many of us imagine; a nefarious, impossibly technical twilight world forever beyond our ken?
Not really.
When you consider that you can go to Google right now and enter a search string which will return you thousands of usernames and passwords to websites, you realize that this dark science is really no mystery at all. You’ll react similarly when you see just how simple a concept SQL Injection is, and how it can be automated with simple tools. Read on, to learn the basics of how sites and web content management systems are most often hacked, and what you can do to reduce the risk of it happening to you.
------------------------
The topics in this article appears to be focused toward people are less familiar with hacking / and defacement techniques overall....however, I am suprised that they didn't include
Remote File Inclusion as one of their topics.
I guess they didn't want to highlight the many insecurity in PHP, since they are running it...lol
No comments:
Post a Comment