Blog Posts Tagged with "RFI"

21d6c9b1539821f5afbd3d8ce5d96380

GSA Seeks Cloud Brokerage Information

July 28, 2012 Added by:Kevin L. Jackson

The objective of this RFI is to learn more about how government can further leverage the key characteristics and advantages of cloud computing to save money and increase IT efficiencies. CSB's are one concept that GSA is exploring and this RFI contains questions specific to cloud brokerages...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

System Compromise: What the Heck is a FeeLCoMz String?

February 03, 2012 Added by:Brent Huston

If you find those strings, they usually indicate other PHP scanners, worms or attack tools have compromised the system. Now, if you don’t find those, it does NOT mean the system is safe, the list of all of those relevant strings would be too large and dynamic to manage...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Air Force Solicits Cutting Edge Cyber Technologies

January 18, 2012 Added by:Headlines

"The Air Force is seeking information on revolutionary hardware and software cyber technology and systems as well as innovative Tactics, Techniques, and Procedures (TTP) that will support, augment and in some cases extend mission range and scope..."

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Understanding PHP RFI Vulnerabilities

June 14, 2010 Added by:Brent Huston

A large majority of publicly disclosed vulnerabilities are PHP related. In 2009, 5733 PHP Remote File Inclusion vulnerabilities were disclosed. In situations where exploiting PHP RFI is possible, most likely SQL Injection and Cross Site Scripting are all possible. This is due to the exploits having the same root cause or lacking input validation.

Comments  (0)