Security Good Practices This page contains a list of URLs that contain good practice guides, audit procedures and technology standards that are freely available.Tags: SecurityGood practices Read more about Security Good Practices
Using sed Some more advanced examples of how to use the sed command in Linux.Tags: LinuxBashsed Read more about Using sed
POSIX character classes Some of the character classes to use in regular expressions. Tags: LinuxBash Read more about POSIX character classes
Using the WebScarab bean shell to modify requests/responses This article shows how you can use the WebScarab bean shell to modify requests and responses that are transmitted and received by WebScarab. Tags: SecurityWeb application security testingJava Read more about Using the WebScarab bean shell to modify requests/responses