Skip to content
Courses
DSA to Development
Get IBM Certification
Newly Launched!
Master Django Framework
Become AWS Certified
For Working Professionals
Interview 101: DSA & System Design
Data Science Training Program
JAVA Backend Development (Live)
DevOps Engineering (LIVE)
Data Structures & Algorithms in Python
For Students
Placement Preparation Course
Data Science (Live)
Data Structure & Algorithm-Self Paced (C++/JAVA)
Master Competitive Programming (Live)
Full Stack Development with React & Node JS (Live)
Full Stack Development
Data Science Program
All Courses
Tutorials
Data Structures & Algorithms
ML & Data Science
Interview Corner
Programming Languages
Web Development
CS Subjects
DevOps And Linux
School Learning
Practice
Build your AI Agent
GfG 160
Problem of the Day
Practice Coding Problems
GfG SDE Sheet
Contests
Accenture Hackathon (Ending Soon!)
GfG Weekly [Rated Contest]
Job-A-Thon Hiring Challenge
All Contests and Events
DSA
Practice Problems
Python
C
C++
Java
Courses
Machine Learning
DevOps
Web Development
System Design
Aptitude
Projects
Sign In
▲
Similar Topics
Web Technologies
39.3k+ articles
Python
20.2k+ articles
C++
4.2k+ articles
GBlog
3.1k+ articles
C Language
1.9k+ articles
Computer Subject
1.3k+ articles
Ethical Hacking
670+ articles
cryptography
170+ articles
vulnerability
15 articles
C-programming
9 articles
secure-coding
25 posts
Popular Articles
Recent Articles
Best Practices for Secure Coding in Web Applications
Last Updated: 02 April 2024
Web applications are essential for corporations to deliver digital offerings, and they have got grow to be increasingly important in recent
...read more
secure-coding
Web Technologies
vulnerability
Cyber-security
Ethical Hacking - Hacking Web Applications
Web Security
Meltdown Security Vulnerability
Last Updated: 29 September 2022
What is Meltdown security vulnerability?Meltdown, also known as Rogue Data Cache Load, is a security vulnerability that affects microprocess
...read more
secure-coding
system-programming
vulnerability
Ethical Hacking
hmac - Keyed-Hashing for Message Authentication
Last Updated: 20 July 2017
HMAC is a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash fu
...read more
Misc
Python
cryptography
secure-coding
Similar Topics
Web Technologies
39.3k+ articles
Python
20.2k+ articles
C++
4.2k+ articles
GBlog
3.1k+ articles
C Language
1.9k+ articles
Computer Subject
1.3k+ articles
Ethical Hacking
670+ articles
cryptography
170+ articles
vulnerability
15+ articles
C-programming
9+ articles
What is WannaCry? How does WannaCry ransomware work?
Last Updated: 07 February 2018
WannaCry is a type of ransomware that infected the National Health Service(NHS) and other organisations across the globe including governmen
...read more
GBlog
secure-coding
Passwords and Cryptographic hash function
Last Updated: 29 September 2022
We have introduced and discussed importance of hashed passwords. To create strong hashed passwords, we must understand some terminology rela
...read more
cryptography
Computer Subject
secure-coding
How slow HTTP can knock down a server
Last Updated: 01 May 2025
Slow HTTP are application layer Denial Of Service (DoS) attack and has the potential to knock down a server with limited resources. Because
...read more
GBlog
Computer Subject
secure-coding
Command Injection Vulnerability and Mitigation
Last Updated: 14 June 2022
Command injection is basically injection of operating system commands to be executed through a web-app. The purpose of the command injection
...read more
Computer Subject
secure-coding
C Language
C++
vulnerability
A basic Python Programming Challenge
Last Updated: 11 April 2025
This time we are not going to go into any theoretical stuff. Some months ago, I wrote a program in Python for my students so that they can p
...read more
GBlog
Python
Computer Subject
secure-coding
Python Programs
Secure coding - What is it all about?
Last Updated: 15 December 2022
So you think you can code? Well that’s great to know… The world definitely needs more geeks and nerds like you and me… But, are your p
...read more
GBlog
Python
Computer Subject
secure-coding
Making your WordPress Website More Secure
Last Updated: 15 April 2025
Why is security needed? Blogging nowadays has become a hobby of so many people, and Wordpress is the most opted platform for the same. By d
...read more
GBlog
Computer Subject
secure-coding
Web Technologies
Wordpress
First
1
2
First
1
2
First
1
2
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our
Cookie Policy
&
Privacy Policy
Got It !