List Headline Image
Updated by Nilesh Sanyal on Oct 12, 2019
16 items   0 followers   0 votes   2 views

PHP Best Practices That You Must Know

This list consists of PHP tutorials that help you to develop better web applications.

Web application security facts to consider for 2019 - Devhelperworld

Security is always an important topic in any field. Web application security is not a different matter. In 2019, web application security becomes so important that common people who use the internet on a daily basis should have at least some basic knowledge about it.

In this post, I will discuss the facts that make web application security as an important and vital topic of interest in 2019. After completely reading this post, you will be able to know why you would care for it in 2019, what are the different impacts of it and finally what are the most common threats to web application security. Read the complete article here.

Know All About SQL Injection In Depth - Devhelperworld

SQL injection is a common attack technique used to attack a web application. In this post, you will know different types of SQL injection attack in depth.

After completely reading this post about SQL injection, you will have a clear concept about it in-depth. Read the complete post here.

SQL Injection Step By Step Part 1 - Devhelperworld

In order to understand SQL injection step by step, this article provides a set of practical examples, so that you won't find it difficult to understand SQL injection step by step with example. Read the complete article here.

SQL Injection Step By Step Part 2 - Devhelperworld

This post is the final part of sql injection series. Read the complete article here.

Top Facts You Need To Know About PHP Code Injection - Devhelperworld

Code injection is a technique used by attacker to inject server-side code from outside so that it can be evaluated by the corresponding server-side technology.

Code injection allows an attacker to compromise database, security, it is also possible to steal data, bypass access and authentication control. This vulnerability can be easy to find or sometimes it may be harder to find. If it sounds interesting to you, read complete article here.

Command Injection In A Nutshell - Devhelperworld

Command injection is a technique used by the attacker to attack a server via it's operating system commands. This type of attack took place when the web application is utilizing system commands to provide some sort of functionality to a web application. If you find command injection interesting, read the complete article here.

Never Mess With Cross Site Scripting And Here'is The Reason Why - Devhelperworld

In a Cross-site Scripting attack, also known as xss, client-side code is injected into the output of a web page, in form of a html attribute, and executed within the user’s browser. The impact of successful exploitation varies. If it sounds interesting, read the complete article here.

Step By Step Guide On Cross Site Scripting - Devhelperworld

Learn cross site scripting attack with a practical example. Click here to read the complete article.

Surprising Facts About Cross Site Request Forgery - Devhelperworld

Cross Site Request Forgery (also known as CSRF) is a web application vulnerability in which attacker's website forces victim's browser to send malicious requests to the vulnerable website in which the victim is currently authenticated.

To perform Cross Site Request Forgery attack, attacker tricks a logged-in user by using social-engineering techniques to perform some tasks on behalf of the user without their knowledge. If it sounds interesting to you, click here to read more.

Object Oriented Programming Principles You Must Know - Devhelperworld

Learn how you can actually apply object-oriented programming principles in PHP. Read the complete article here.

The Web Programming Basics You Must Know For Sure - Devhelperworld

Learn the web programming basics in simple plain English. Every web developer must know these fundamental concepts. Know these concepts by reading the complete article here.

The Best way To Protect Your Application Against Broken Authentication - Devhelperworld

Broken authentication happens due to poor implementation of authentication and session management.It is one of the most common type of OWASP vulnerability. Read the in-depth article about broken authentication here.

7 Ways To Put An End To Sensitive Data Exposure in 2019 - Devhelperworld

Sensitive data exposure vulnerabilities may occur due to the negligence of protecting sensitive information from being disclosed to attackers. Read the complete article about sensitive data exposure here.

Four Ways To Stop Security Misconfiguration in 2019 - Devhelperworld

Security misconfiguration is the #6 vulnerability on OWASP's list of top ten most common vulnerabilities.It includes broad category of configuration issues. Read the complete article about security misconfiguration here.

3 Challenges You Could Be Faced By Xml External Entity Injection - Devhelperworld

XML External Entity injection attack allows an attacker to perform reading local files on server, it is mainly based on server side request forgery(SSRF). Read the complete article about XML External Entity injection attack here.

Top Risks Of Components With Known Vulnerabilities in 2019 - Devhelperworld

Components with known vulnerabilities is one of the top 10 OWASP vulnerability. It could compromise the security of system using 3rd party softwares. Read the complete article about Components with known vulnerabilities here.