• Cross-site scripting 101: XSS attacks plague Web browsers

    Cross-site scripting (XSS) attacks have been a burden for security professionals for a long time, and it doesn't appear that there is an end to these attacks coming any time soon. An attacker can use an XSS attack to gather vital information from your users whenever he uses a browser on your...

    Kevin Beaver17,385 pointsBadges:
  • Virtualization automation with Hyper-V: Windows PowerShell scripting

    With Microsoft Hyper-V, your greatest virtualization automation weapon is Windows PowerShell scripting. You can use cmdlets and task scheduling to improve task automation.

    ITKE350,945 pointsBadges:
  • Using Nessus Attack Scripting Language (NASL) to find application vulnerabilities

    For anyone who doesn't speak NASL, network security expert Mike Chapple has a firm handle on the Nessus Attack Scripting Language. In this brand-new addition to our Nessus 3 Tutorial, Chapple provides examples of NASL scripts that can find known vulnerabilities in your customized or third-party...

    searchsecurity21,135 pointsBadges:
  • Build your knowledge of PowerShell scripting basics

    If you don't know the basics of PowerShell yet, it's time to buckle down and learn how this language can ease Exchange management tasks.

    Toni Boger745 pointsBadges:
  • Eliminate configuration drift through declarative scripting

    Fight back against configuration drift with a management strategy that relies on PowerShell and Desired State Configuration.

    Nick Martin670 pointsBadges:
  • Jeremiah Grossman on the pervasive nature of XSS

    Jeremiah Grossman, founder and chief technology officer of WhiteHat Security, talks about his new book, Cross Site Scripting Attacks: XSS Exploits and Defense; how developers and users can defend themselves against XSS; and the state of Web application security today.

    SearchSOA.com4,750 pointsBadges:
  • Recording the change

    SearchWinSystems.com's monthly scripting column gives valuable advice to both newbies and experienced admins. This month, expert Christa Anderson explains how to read the Registry and record the value of a key in the Event Viewer.

    CAnderson760 pointsBadges:
  • Scripting School: What about location-based mappings?

    Christa Anderson builds on her previous column, which explained the tools you need for automatically connecting to network resources. Here are some scenario-based variations to try and a sample script.

    CAnderson760 pointsBadges:
  • Working with the environment

    Scripting without objects is very limiting. This month's scripting column introduces you to a sampling of the Windows Scripting Host objects, how they help you perform administrative tasks and work with your environment.

    CAnderson760 pointsBadges:
  • Reading computer names from a file

    You can save substantial time by running a script that connects to remote computers by name or as part of an Active Directory domain. This month's scripting column explains how.

    CAnderson760 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following