Quantcast
Channel: Knowledge Base – Astra Security Blog
Browsing all 10 articles
Browse latest View live

Comment installer SQLite for PHP sur mon serveur Apache/nginx ? (Install...

SQLite est une base de données relationnelle très populaire, conçue pour être intégrée dans des applications logicielles. Si votre serveur ne dispose pas encore des pilotes SQLite pour PHP, veuillez...

View Article


Image may be NSFW.
Clik here to view.

7 Best WooCommerce Themes for Your E-commerce Store

Do you want to create an eCommerce store? In that case, WooCommerce (WC) is an outstanding option for you. It creates unique solutions for professionals invested in web commerce when combined with the...

View Article


Image may be NSFW.
Clik here to view.

A Complete Guide on Website Defacement Prevention

Did you see when Donald Trump’s website defaced by hackers during the presidential election? Or when Lenovo’s website was hacked and visitors were greeted with slideshows of bored teenagers? According...

View Article

Image may be NSFW.
Clik here to view.

A Complete Guide on CSS Injection Prevention – Examples & Steps Included

Globally, 40% of all cyber-attacks are done through code injection methodology, which shows that code injection is one of the favorite methods for attackers. So there is a fair chance that your...

View Article

Image may be NSFW.
Clik here to view.

What is Blockchain Security? – An Ultimate Guide

Bitcoin worth $72 million was robbed from one of the largest crypto exchanges named Bitfinex due to stolen keys. We’ve seen many instances in the past few years where blockchain solutions were...

View Article


Image may be NSFW.
Clik here to view.

What is CERT-IN Certification and How To Obtain It?

A CERT-IN Certificate is awarded to a company after a successful Vulnerability Assessment & Penetration Test (VAPT) by a CERT-IN empanelled cyber security organization like Astra. The VAPT should...

View Article

Image may be NSFW.
Clik here to view.

Blockchain Security Issues – A Complete Guide

Undoubtedly, blockchain technology has seen a widespread adaption in recent years. Apart from initial adaption into cryptocurrencies, today it is being used in healthcare, real estate, smart contacts,...

View Article

Choosing a SaaS Product for your Business? 4 Things To Check Before Buying

Software-as-a-Service (SaaS) is not just a cloud-software delivery model, but also a service that offers the flexibility of running IT and business operations over a managed platform.  There’s no...

View Article


Image may be NSFW.
Clik here to view.

7 Web Security Mistakes to Avoid (And How to Do So)

Whether it’s misconfiguring your site’s security settings or not using adequate security measures for your web apps, web security vulnerabilities are a big issue for businesses. They lead to many...

View Article


Image may be NSFW.
Clik here to view.

Top 7 Privileged Access Management (PAM) Solutions in 2024

Privileged Access Management (PAM) is a comprehensive framework of policies, strategies, and technologies designed to regulate, oversee, and fortify access to critical resources for human and service...

View Article
Browsing all 10 articles
Browse latest View live