DotNek software and app development - Security Blog
How do I get rid of malware? In this article you will become familiar with the true definition of malware. In addition you will learn some ways and methods to get rid of malwares.
Feb 01, 2022 |
Common web security vulnerabilities One of the ways to increase system and web security is to increase information in this field, which is why we have introduced Common web security in the following.
May 05, 2021 |
Mobile-app security checklist To ensure the security of mobile applications, it is necessary to pay attention to various points, which are discussed below in the Mobile app security checklist.
Jul 26, 2020 |
Security challenges in Internet of Things One of the most important issues in the field of security is challenges in Internet of Things, which we have addressed in this article.
Aug 27, 2021 |
What does Cross-Site-Scripting (XSS) mean? Hackers use various methods to infiltrate the systems of users and organizations, one of which is the use of XSS or cross-site scripting, which is explained below.
Jan 05, 2022 |
Top Threats to Your Privacy and Security Online In this article, we are going to address the topic of Threats to Your Privacy and Security Online so that you can increase your awareness in this area.
Nov 29, 2021 |
Can an iPhone be hacked by visiting a website? As you know, the iPhone has a lot of fans all around the world, which is one of the reasons why so many hackers are trying to hack it in different ways.we want to talk about Can an iPhone be hacked by looking at a website?
Sep 30, 2021 |
What is the major concern of cloud computing? In this article, DotNek group will explain what exactly is the cloud computing and how does it work. You will see the major concern about it as well.
Dec 13, 2021 |
What jobs are there in cyber security? If you are interested about cyber security jobs, their salaries and their experiences, how to learn hack an attacks, just clock here now!
Nov 20, 2021 |
Top 10 most notorious cyber-attacks in history Throughout history, attacks have been carried out by hackers and attackers, which have many negative and destructive effects, and in this article, we want to mention 10 of the most costly attacks in the history.
Nov 20, 2021 |
How to Secure your WooCommerce Store Several customers log in to their accounts in WooCommerce stores. So, how do we increase our online shop's security? In this article, we will address the way how to secure the woocommerce e-shop.
Nov 17, 2021 |
What is a rootkit and how is it used? In this article you will know what is a rootkit, why it is called rootkit and how does it work. Rootkits usages are important to be known and you will figure the reason out.
Nov 17, 2021 |
What can be a goal of XSS attack? In this article DotNek group will define XSS attacks (Cross Site Scripting) as well as mentioning a goal of this kind of attack. You will also become familiar with some examples of the XSS attack and their results in action.
Nov 15, 2021 |
What are the two types of cross site attack You will find out the exact and accurate meaning of cross sites hacking method, besides getting familiar with two different types of it. You also will learn how to protect your system from a cross-site attack.
Nov 15, 2021 |
Is it possible to cheat the lottery? In this article we will figure out the possibility of lottery cheating as well as its consequences after the drawing has finished and results are showed up and cheaters are identified.
Nov 15, 2021 |
How do i detect a Trojan? There are more than 20 available types of Trojans. Here, we are just talking about a few of them.
Nov 15, 2021 |