Rocky

Rocky

 

Writer, Web developer, and Cyber geek. I have been writing professionally for the best 2 years, and have finally create a place Codelivly where I can share my views and roundups to make your knowledge much, much easier.

Member since Aug 14, 2022 admin@codelivly.com

Following (0)

Followers (2)

Mobile Device Security, Risks, Vulnerabi...

However, increases in organizational mobility typically result in an increase in the number of mobile devices that are accessing y...

Read More

OWASP Top 10 Mobile Vulnerabilities

As mobile applications continue to grow as an attack vector, organizations will need to prioritize mobile app security to fortify ...

Read More

Mobile Platform Attack Vectors Explained

An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to del...

Read More

Bluetooth Hacking

Bluetooth is a universal protocol for low power, near field communication operating at 2.4 - 2.485 GHz using spread spectrum, freq...

Read More

Public Key Infrastructure

PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange inf...

Read More

Wireless Network Attack

Wireless networks have become an integral part of how we conduct our businesses. They ease many processes and help us get rid of t...

Read More

Wireless Hacking Methodology

The use of wireless networks has increased exponentially over the last decade or so. Wi-Fi is being extensively used not only by ...

Read More

Wireless Encryption

Wireless encryption secures your wireless network with an authentication protocol. It requires a password or network key when a us...

Read More

Wireless Concepts

A wireless network is a set of two or more devices connected with each other via radio waves within a limited space range. The dev...

Read More

Types of SQL Injection (SQLi)

SQL Injection can be used in a range of ways to cause serious problems. By levering SQL Injection, an attacker could bypass authen...

Read More

SQL Injection Testing

SQL injection testing requires understanding an application’s interaction with a database server to access data. Applications ofte...

Read More

Secure Socket Layer (SSL)

Secure sockets layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an ...

Read More