Skip to Content
Developer's Guide to Web Application Security
book

Developer's Guide to Web Application Security

by Michael Cross
April 2011
Intermediate to advanced
500 pages
16h 12m
English
Syngress
Content preview from Developer's Guide to Web Application Security
Figure 3.16 Searching for the Word Trumpet in the BO2K Server File
Once you have the hacker’s e-mail address, you might be able to make him
sweat a little. If the hacker is knowledgeable, he may have used an anonymous e-mail
server. If so, he may be difficult or impossible to trace, but you can contact the ISP,
the upstream provider, and your local federal agent, depending on the severity of the
attack. In either case, you can have the satisfaction of e-mailing him and letting him
know you were too smart for him and he has the possibility of having his account
taken away for abuse of the terms of service.
Firewall Software
One of the main benefits of fire ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security for Web Developers

Security for Web Developers

John Paul Mueller
Securing Web Applications

Securing Web Applications

Stephen Gates, Allan Liska

Publisher Resources

ISBN: 9781597490610