Amazines Free Article Archive - Monday, August 15, 2022
Read about the most recent changes and happenings at
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Subscriptions Manage Ezines
 Article Archive
 Advertising (133525)
 Advice (161581)
 Affiliate Programs (34788)
 Art and Culture (73842)
 Automotive (145681)
 Blogs (75446)
 Boating (9851)
 Books (17221)
 Buddhism (4129)
 Business (1330086)
 Business News (426438)
 Business Opportunities (366485)
 Camping (10971)
 Career (72777)
 Christianity (15845)
 Collecting (11639)
 Communication (115072)
 Computers (241922)
 Construction (38939)
 Consumer (49947)
 Cooking (17079)
 Copywriting (6732)
 Crafts (18205)
 Cuisine (7548)
 Current Affairs (20308)
 Dating (45902)
 EBooks (19700)
 E-Commerce (48247)
 Education (185377)
 Electronics (83517)
 Email (6439)
 Entertainment (159838)
 Environment (28923)
 Ezine (3040)
 Ezine Publishing (5452)
 Ezine Sites (1550)
 Family & Parenting (110929)
 Fashion & Cosmetics (196540)
 Female Entrepreneurs (11851)
 Feng Shui (132)
 Finance & Investment (310512)
 Fitness (106443)
 Food & Beverages (63012)
 Free Web Resources (7939)
 Gambling (30227)
 Gardening (25194)
 Government (10512)
 Health (629911)
 Hinduism (2206)
 Hobbies (44080)
 Home Business (91593)
 Home Improvement (251150)
 Home Repair (46217)
 Humor (4717)
 Import - Export (5456)
 Insurance (45104)
 Interior Design (29591)
 International Property (3488)
 Internet (191011)
 Internet Marketing (146666)
 Investment (22859)
 Islam (1161)
 Judaism (1352)
 Law (80455)
 Link Popularity (4596)
 Manufacturing (20902)
 Marketing (99276)
 MLM (14140)
 Motivation (18232)
 Music (26999)
 New to the Internet (9497)
 Non-Profit Organizations (4048)
 Online Shopping (129728)
 Organizing (7809)
 Party Ideas (11853)
 Pets (38072)
 Poetry (2229)
 Press Release (12687)
 Public Speaking (5640)
 Publishing (7561)
 Quotes (2407)
 Real Estate (126617)
 Recreation & Leisure (95461)
 Relationships (87650)
 Research (16180)
 Sales (80346)
 Science & Technology (110281)
 Search Engines (23497)
 Self Improvement (153287)
 Seniors (6217)
 Sexuality (35998)
 Small Business (49289)
 Software (83018)
 Spiritual (23482)
 Sports (116150)
 Tax (7661)
 Telecommuting (34073)
 Travel & Tourism (308186)
 UK Property Investment (3122)
 Video Games (13382)
 Web Traffic (11764)
 Website Design (56892)
 Website Promotion (36618)
 World News (1000+)
 Writing (35839)
Author Spotlight

Working in this organization from last 10 years. I did my graduation from the University of Texas, U...more

The Word of God is as, “Sweet as Honey”. God has Taken Me Through a Whole Lot of Things...more

Myself Ram Sewak possessing indepth domain experience of more than 10 years in SEO, SEM, Web Develop...more

Areesh Ishtiaq a Top Rated SEO and Digital Marketing Guru on Upwork, working as a project manager fo...more

About Octopus Intelligence We provide greater certainty with excellent global Commercial Compe...more

Author: Sam White

Company: Iviz Security

Region: USA


Author Comment / Biography:
Sam White Marketing Analyst, Iviz Techno solutions

Displaying 1 to 10 of 16 articles Next >
Pages: 1 2
 Articles by Sam White 
1. What are the steps to mitigate Top 5 OWASP Vulnerabilities of 2013?
November 08, 2013

A programmer’s nightmare comes true when hackers / security assessment tools point out vulnerabilities in their code. The onus of quality of a product / software doesn’t depend entirely on QA testers; a huge part of it relies on a programmer’s ability to code securely.

Below are the top 5 OW...

2. Counter-measures against Man-in-the-Browser attacks: Things to keep in mind while doing Online Bank
September 05, 2013

Online banking had been a lucrative target for cyber-criminals since its advent. Nowadays, almost all banks have an online presence and most allow their customers to do online transactions. In the initial days, phishing was a very widely used method to obtain banking credentials from unsuspecting vi...

3. What are the Top 5 Big Data Vulnerability Classes?
July 16, 2013

Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and challenges and I happily accepted.


4. Fast & Furious Joomla Security Guide
June 26, 2013

Joomla is one of the most popular CMS which gives ease of installation, handling and managing your web application. And so being obvious is used in many popular sites and therefore security of Joomla is of great importance in order to keep the web application secure. However Joomla being an open sou...

5. iViZ Launches The Most Comprehensive Mobile Application Security Testing as a Service
June 21, 2013

We are excited to announce the launch of mobile application security testing. iViZ shall provide the most comprehensive mobile application security testing by combining static application security testing, dynamic application security testing and manual validation. The solution is aimed to provide z...

6. 5 Real time applications of Attack Trees.
June 10, 2013

Attack trees are introduced by Bruce Schneier, in the year 1999, as a methodological and graphical way to analyze various attacks in a system. Since its introduction, attack trees have been used in various ways by security researchers. I personally love their simplicity and comprehensiveness.


7. Vulnerabilities in Security Products increasing at 37% CAGR !
May 29, 2013

We use security products to secure our systems and our businesses. However, the very security products we use, can themselves have vulnerabilities which can leave us susceptible to attacks. We conducted a study recently to understand the vulnerability trends in security products. Read further to kno...

8. Bypassing XSS Filters
May 08, 2013

Since the time bug bounties have started, a lot of security vulnerabilities can be seen reported. From the college students to Hard Core Security Researchers, all have been into it. Cross-site scripting or XSS is one such type of security flaw which is very frequently reported as this can be found m...

9. Data Security: The Next Big Security Focus in India ?
April 08, 2013

Data explosion and advent of big data are phenomena, which are a result of economic development of nations and increase in digital footprint of organizations. With more and more devices getting connected to the core business enterprise network, in order to serve the need of anytime-anywhere informat...

10. Magic, Hacking and Kevin Mitnick
April 04, 2013

In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a product to simulate a human hacker. I believe Magic helped me in Security. Somehow deep in my heart I always felt there is a magician in a hacker.

Magic at fi...

Next >
Pages: 1 2

 Author Login 
Register for Author Account


Advertiser Login


   Limited Time $60 Offer!
   90  Days-1.5 Million Views  


Great Paranormal Romance


Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more

Stevert Mckenzie, Travel Enthusiast. ...more

After 60-plus years of living I am just trying to pass down some of the information that I have lear...more

William Buchanan has worked in the fields of marketing, advertising, and marketing research for almo...more

Susan Friesen, founder of the award-winning web development and digital marketing firm eVision Media...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2022, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from under the GNU FDL license