Hot Downloads

LanGuard Network Security Vulnerability Scanner and Patch Management


netsparker-category-logo-v1Netsparker Web Application Security Scanner detects and reports vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications, regardless of the platform and technology they are built on. Netsparker scanning engine’s unique detection and exploitation techniques allow it to be dead accurate in reporting vulnerabilities; hence it does not report any false positives. The Netsparker web application security scanner is available in two editions; a downloadable software and as Netsparker Cloud, an enterprise online web security scanning service.

In this section you'll find useful information about SQL Injection, Cross-site Scriptting and other attack methods, but also useful technical articles to help understand and maximize Netsparker's capabilities.

Display #
Title Hits
What is Cross-site Scripting (XSS)? Why XSS is a Threat, how does XSS Work? Different Types of XSS Attacks 3270
Creating a Cross-site Scripting (XSS) Attack. Understanding How XSS Attacks Work & Identifying Web Vulnerabilities 2397
Four Security Principles That Help Secure Web Applications & Restrict Access to Sensitive Data 2212
Automate Web Application Security - Why, How & The Necessary Tools 2171
Top 3 Most Popular Web Application Vulnerabilities - Security Scans of 396 Open Source Web Applications 1924
Web Application Vulnerabilities – Benefits of Automated Tools & Penetration Testers 2671
Scan and Generate Firewall Rules to Secure your Website and WebServer with ModSecurity & Netsparker. Block Exploits & Vulnerability Attacks 3831
Differences between Network & Web Application Security. Comparing Network Security with Web Security 3190
Understanding, Avoiding & Protecting Against Cross Site Request Forgery Attacks 2660

Tags: network security SQL Injection web scanner web vulnerability scanner webserver security xss attack how xss works false positive False Positive Free Web Application Security Scanner exploitation techniques

Articles To Read Next:


Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V


  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup