• Hot skills: Could Ruby be the jewel in the crown of scripting?

    Ruby is a relative latecomer among scripting languages but it has developed a distinct niche for itself.

    ComputerWeekly4,860 pointsBadges:
  • Build your knowledge of PowerShell scripting basics

    If you don't know the basics of PowerShell yet, it's time to buckle down and learn how this language can ease Exchange management tasks.

    Toni Boger980 pointsBadges:
  • XSS vs. XSSI: What is cross-site script inclusion?

    Expert Michael Cobb explains the difference between cross-site scripting and cross-site scripting inclusion (XSSI) flaws.

    SearchCloudSecurity4,045 pointsBadges:
  • Eliminate configuration drift through declarative scripting

    Fight back against configuration drift with a management strategy that relies on PowerShell and Desired State Configuration.

    Nick Martin1,160 pointsBadges:
  • Cross-site scripting 101: XSS attacks plague Web browsers

    Cross-site scripting (XSS) attacks have been a burden for security professionals for a long time, and it doesn't appear that there is an end to these attacks coming any time soon. An attacker can use an XSS attack to gather vital information from your users whenever he uses a browser on your...

    Kevin Beaver20,675 pointsBadges:
  • Virtualization automation with Hyper-V: Windows PowerShell scripting

    With Microsoft Hyper-V, your greatest virtualization automation weapon is Windows PowerShell scripting. You can use cmdlets and task scheduling to improve task automation.

    ITKE392,170 pointsBadges:
  • Using Nessus Attack Scripting Language (NASL) to find application vulnerabilities

    For anyone who doesn't speak NASL, network security expert Mike Chapple has a firm handle on the Nessus Attack Scripting Language. In this brand-new addition to our Nessus 3 Tutorial, Chapple provides examples of NASL scripts that can find known vulnerabilities in your customized or third-party...

    searchsecurity25,005 pointsBadges:
  • Jeremiah Grossman on the pervasive nature of XSS

    Jeremiah Grossman, founder and chief technology officer of WhiteHat Security, talks about his new book, Cross Site Scripting Attacks: XSS Exploits and Defense; how developers and users can defend themselves against XSS; and the state of Web application security today.

    SearchSOA.com5,545 pointsBadges:
  • Recording the change

    SearchWinSystems.com's monthly scripting column gives valuable advice to both newbies and experienced admins. This month, expert Christa Anderson explains how to read the Registry and record the value of a key in the Event Viewer.

    CAnderson760 pointsBadges:
  • Scripting School: What about location-based mappings?

    Christa Anderson builds on her previous column, which explained the tools you need for automatically connecting to network resources. Here are some scenario-based variations to try and a sample script.

    CAnderson760 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.