How2Lab Logo
tech guide & how tos..


Web Security

The internet provides a cost-effective platform for businesses, organizations and individuals to deploy their websites and other resources so that they are accessible globally. The advantages of the internet has made it a very popular medium today and created a large virtual world. However, just like the real world, the web world too is not devoid of criminals. The Web poses a unique set of security issues, which must be addressed to minimize risk. This becomes particularly important when you are selling your products and services at your website and providing online methods of collecting payments. Customers will buy from your website only if they have the confidence that their personal information and especially sensitive information such as credit card data is secure. To succeed in this market you must be fully aware of Internet security threats so that you can take adequate advantage of the technology that overcomes them.

This section on Web Security aims to make you aware of the security threats involved with applications running on the web, and help develop a deeper understanding of the underlying concepts.




Windows Vulnerability - WannaCry Ransomware

WannaCry Ransomware is a type of Trojan which locks your device and then the hacker tries to extort money to get your device unlocked. Read on to understand what this virus is and what it can do.

Digital Certificate - Implementing SSL for your website

Understand what a digital/SSL certificate is, why you need it and what is the process of setting it up for your website.

Frequently asked questions related to SiteLock

This article provides answers to most frequently asked queries about SiteLock - the ultimate security system for your website.

How to secure your website from attack?

Learn how you can Protect your website from Viruses, Bot Attacks, Hackers, Identity Theft and Search Engine Blacklists using SiteLock - an easy to deploy SAAS based security system.

What is a Firewall and why is it important for network security?

Is merely installing an anti-virus software enough to protect your computer system? What else do you require to ensure that your personal computer or your organization's network is protected? This article provides an overview of firewall and its importance in securing a single computer or an organization's network of computers from the threats posed by the Internet.

Iframe Hacking

What is Iframe hacking and how hackers gain access to a website through iframe hacking. How to protect your website from iframe hacking?

Top 9 PHP Security Blunders

This article gives you an insight into the security loopholes that can be introduced in your PHP based website. You will understand how, due to bad programming practice, a programmer inadvertently introduces security holes in a web application and how this can be avoided by taking care of a few easy to implement things.

What is Gumblar Attack?

The malicious code known as Gumblar or Troj/JSRedir-R, which infects websites, was first detected in March 2009 and exists even today. Find out how this attack operates and how you can protect yourself from being a victim of Gumblar attack.

How to keep your personal computer protected from hackers

Now-a-days we all use our personal computer extensively for surfing the net and for emails. Many of us are in the habit of keeping our computer always connected to the Internet, even when we are not using it. This article provides some very basic things you can do to keep your PC secure from getting hacked.

What is Phishing?

Are you careful before opening an email you receive from a known or unknown source? Understand what is a phishing attack and how you can protect yourself from it.

What is Hacking?

Get an overview of what is hacking, how hackers enter into your computer system, and what kinds of damage they can do.

Introduction to Security on the web

A brief introduction to web security. Get an overview of the different types of threats that your computer systems are subjected to when they are connected to the Internet. Understand what should be a holistic approach towards security deployment for your organization.


Refer a friendSitemapDisclaimerPrivacy
Copyright © How2Lab.com. All rights reserved.