[Secure 101] What is Penetration Testing (pen testing)? How It Conducted?Penetration Testing (or pen testing) is a mechanism used to verify whether network defenses are functioning as expected. This test simulates the behavior of hackers and malicious users attempting to breach a company’s website, information systems, or...Aug 26, 2024·6 min read
Can I Encrypt PHP Source Code? How Can Enterprises Protect Their PHP Code?PHP is one of the most common server-side programming languages for websites, widely used in developing various web applications. Its flexible coding style and powerful functionality have made it popular worldwide among web developers. However, since...Dec 2, 2023·5 min read
[Secure 101] What are 2FA and MFA? Does My Website Need These Features?As digitalization becomes increasingly prevalent, we rely more on websites for various aspects of life and work, including shopping, banking, and social media. However, this convenience also brings many security risks. We often see news about online ...Nov 27, 2023·6 min read
[Secure 101] Is It Really Safe to Change Passwords Every 90 Days or Regularly?Traditional Idea: Users Should Change Passwords Frequently In the digital world, protecting personal and corporate information security is a crucial aspect of our daily lives. Over the years, corporate security policies have often advised us to regul...Nov 27, 2023·4 min read
What is Secure Remote Password (SRP) and How to use it to protect users' passwords.Introduction Secure Remote Password (SRP) protocol is a method of secure authentication designed to safely verify a user's credentials without transmitting the password over the network. Unlike traditional password hashes, which rely on a password be...Nov 26, 2023·9 min read