WhatIs definition: SSL checker

Web Browser Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Why SSL certificate security matters

    In this Security School, you'll learn about specific methods used to exploit SSL and how to defend against them. 

  • Web Application Security

    This series looks at Web application threats, secure software development practices and the challenge of finding and fixing Web application vulnerabilities. 

  • Book chapter: Browser security principles, same-origin policy exceptions

    This is an excerpt from the book Web Application Security: A Beginner’s Guide that describes the intricacies of using script code within the framework of a same-origin policy. 

  • Web browser security tutorial: Safari, IE, Firefox browser protection

    Newly updated: This Web browser security tutorial identifies the inherent flaws of Internet Explorer and Mozilla Firefox, introduces viable Web browser alternatives and provides tools and tactics to maximize your Web browsing security and browser pro... 

  • Spyware Protection and Removal Tutorial

    This free spyware protection and removal tutorial is a compilation of free resources that explain what spyware is, how it attacks and most importantly what you can to do to win the war on spyware. 

  • State-based attacks: Session management

    In this excerpt from Chapter 4 of "How to Break Web Software: Functional and Security Testing of Web Applications and Web Services," authors Mike Andrews and James A. Whittaker identify session management techniques Web developers should use to prote... 

  • Firefox security

    What if Firefox was as big a target as Internet Explorer? Would it still be the more secure option? Confessed Microsoft enthusiast Brien Posey examines the reality of Firefox's more secure reputation. 

  • SearchSecurity.com's top clicks of 2005

    SearchSecurity.com's top five tips, news articles and learning tools from 2005. 

  • Gaining access using application and operating system attacks

    In this excerpt from Chapter 7 of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition, authors Ed Skoudis and Tom Liston explain how security professionals can use exploit frameworks to their advanta... 

  • Web Security School Lesson 3

    In Lesson 3 of Web Security School, Michael Cobb teaches you how to plan and implement Web directory structures and permissions, and manage secure Web development. Also, a primer on secure coding and data management, and procedures for combating Web ...