Category Archives: Security Guidelines

How to start with Vega:The web security scanner?


Vega – Web security scanner and web security testing platform. Alright, Today I have come up with an interesting topic which is Vega and this blog is inspired by the last blog I wrote on web security. Vega is nothing but … Continue reading

Posted in Security, Security Audit, Security Guidelines, testing, Vulnerability Scanning, Web, web application | Leave a comment

Configuring SSH Key Authentication on Linux


Now Days it is very convenient to use Remote Desktop Protocol(RDP) for accessing remote system over Internet, specially server systems(either client to server or server to server), although it is very convenient and easy way to access remote systems but … Continue reading

Posted in AWS, AWS Services, Security, Security Controls, Security Guidelines | Tagged , , , , , , | Leave a comment

Handling HTTPS requests with Akka-HTTPS Server


Hi guys, In my last blogs I explained how one can create a self-signed certificate and KeyStore in PKCS12. You can go through the previous blog, as we’ll be needing certificate and keystore  for handling HTTPS requests. https://blog.knoldus.com/2016/10/18/create-a-self-signed-ssl-certificate-using-openssl/ https://blog.knoldus.com/2016/10/26/how-to-create-a-keystore-in-pkcs12-format/ Akka-HTTP provides both Server-Side and … Continue reading

Posted in Akka, akka-http, Scala, Security, Security Audit, Security Checklist, Security Controls, Security Guidelines | Tagged , , , , , , , , , , , , , , , , , , , | 4 Comments

How to build secure Web Application


We all use web applications everyday whether we consciously know it or not. That is, all of us who browse the web. Now a days we have seen a significant surge in the amount of web application specific vulnerabilities that are disclosed to … Continue reading

Posted in Scala, Security, Security Audit, Security Checklist, Security Controls, Security Guidelines, web application | Leave a comment