A Secure Multilayer Honeypot in an E-Commerce Web Application
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2
Abstract
E-commerce web applications are on a verge of not providing fair chance to all the consumers. E-commerce can be unfair especially in case of the check-out process as when many business trading corp. are vying for the limited supply item. Web applications security is more of a continuous plight as hackers and crackers are busy being creative avoiding/bypassing the many defensive tools to regulate security. The actuality is that the e-commerce application security is breached when some unethical corp. apply pre-formatted spiders or scripts to place orders. This gives them a very unjust advantage. Thus to rule out the problem i.e. to eliminate spiders/scripts in web applications by using a solution which is impractical to crack with no extra actions by the end user, this paper introduces an very innovative multilayer access to honeypots. This way is technically non-practical to crash or bypass proving secured web application forms.
Centurian Syndrome
"ABSTRACT: AIM To describe clinical features and surgical outcome in patients of centurian syndrome. MATERIALS AND METHODS Retrospective study of three patients who underwent surgical correction for centurian syndrome be...
Facies Characteristics, Depositional Environments and Sequences Stratigraphy of the Euphrates Formation in Hadetha Area, Western Iraq
The Euphrates Formation (Lower-early middle Miocene) shallow water carbonates deposits, western Iraq was studied in order to determine its microfacies and depositional environment. According to, the benthic foraminifera...
Evaluation of Diagnostic Radiology Department in Term of Quality Control (QC) of X-Ray Units at Khartoum State Hospitals
"The mean objective in diagnostic radiology is to in provide high quality diagnostic image while keeping the patients and workers dose in the lower limit according to ALARA principle, (Maria Lucia Nana et al 2009). To...
Matrix Convolution using Parallel Programming
The convolution theorem is used to multiply matrices of two different sizes i.e. matrices in which the number of rows in the first matrix is not equal to the number of columns in the second matrix. In this study, the mul...
Factors Affecting Implementation of E-Procurement Practices in Public Service in Kenya: A Case of Ministry of Finance
This paper presents a study into the key lessons learnt from e-procurement implementation at public sector organisations in Kenya. The literature relating to e-procurement implementation and operation is reviewed, identi...