Security Best Practices

How To Develop Secure Software – Action Plan To Make Secure

The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…

8 years ago

VoIP Penetration Testing Part-II

In the previous tutorial VoIP Penetration Testing Part-I we have learnt on how to do Information Gathering/ Footprinting using Google…

10 years ago

VoIP Penetration Testing Part -I

Abstract               Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which…

10 years ago