Our Blog

Welcome to the NLSoftworks blog! Here we talk about secutity coding and lots of other fun stuff.

 

Featured Post

Hacked Site Overview 02

This site was using a old version of convert plug, having a large securiry flaw allowing hackers to modify any files on the site, unfortunatly for this site. Every single file on this site was modified to add a redirect script to send the users into spam. Unfortunaly...

About Us

Welcome to NLSoftworks

Welcome to NLSoftworks

Welcome to Novak, Line Software Company! We focus on web projects that are mainly WordPress. I am Edward Novak, a senior Software Engineering major, and my partner Hunter Line is a Computer Science major. We started this company to help small businesses with getting...

Our Posts

Hacked Site Overview 02

This site was using a old version of convert plug, having a large securiry flaw allowing hackers to modify any files on the site, unfortunatly for this site. Every single file on this site was modified to add a redirect script to send the users into spam. Unfortunaly...

Hacked Website Overview

This particular website was on wordpress 3.6 and had not been updated in 8 or so years. The site ran smoothly up until today, the customer noticed that if you google the site and click the link it actually brings you to a different site. This was a super sneaky hack...

WordPress is it Secure?

WordPress is it Secure?

Wordpress is a content management system for websites, this is a great tool that allows developers to create sites without having to worry about creating all the features from scratch. This also allows clients to easily edit and update the text on the site. In the end...

The Largest Security Breach in History!

The Largest Security Breach in History!

In 2013 there was a breach in yahoo’s cybersecurity that would become the largest cybersecurity breach in history. The attack was to steal information from yahoo’s users such as backup emails, security questions, and passwords. Initially yahoo discovered in august of...

A Thorough Examination and Explanation of XSS Attacks!

A Thorough Examination and Explanation of XSS Attacks!

For this blog post I will be discussing XSS attacks what this type of attack is, how attackers execute this attack, a real-world example of people exploiting this vulnerability, and how to successfully prevent an attacker from exploiting this vulnerability on your...

In Depth Look at SQL Injections!

In Depth Look at SQL Injections!

For this blog post I will be discussing SQL injections what this type of attack is, how attackers execute this attack, a real-world example of people exploiting this vulnerability, and how to successfully prevent an attacker from exploiting this vulnerability on your...

Looking Under the Hood at CSRF Attacks!

Looking Under the Hood at CSRF Attacks!

For this blog post I will be discussing CSRF attacks what this type of attack is, how attackers execute this attack, and real-world examples of people exploiting this vulnerability, and how to successfully prevent an attacker from exploiting this vulnerability on your...

The Different Types of Firewalls and How They Work!

The Different Types of Firewalls and How They Work!

Firewalls have been around since the internet has become popularized with the first network firewall being designed in the 1980s. Firewalls are the first line of defense a computer had, and it is very imperative to have one. The reason being that it establishes a...

How DDoS Attacks Really Work!

How DDoS Attacks Really Work!

A distributed denial of service (DDoS) attack is when there is a flood of traffic to a particular service or network making it impossible for actual users is operate with the service or the network. A great common analogy for a DDoS attack would be if a bunch of...

Subscribe

Join My Newsletter

Contact Form

close-link