When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. JSFuck - Wikipedia

    en.wikipedia.org/wiki/JSFuck

    Lacking the distinct features of "usual" JavaScript, obfuscation techniques like JSFuck can assist malicious JavaScript code in bypassing intrusion prevention systems [17] or content filters. For instance, the lack of alphanumeric characters in JSFuck and a flawed content filter allowed sellers to embed arbitrary JSFuck scripts in their eBay ...

  3. Jscrambler - Wikipedia

    en.wikipedia.org/wiki/Jscrambler

    Jscrambler is a technology company mainly known for its JavaScript obfuscator and eponymous monitoring framework. The obfuscator makes it harder to reverse engineer a web application's client-side code and tamper with its integrity.

  4. Minification (programming) - Wikipedia

    en.wikipedia.org/wiki/Minification_(programming)

    The goals of minification are not the same as the goals of obfuscation; the former is often intended to be reversed using a pretty-printer [citation needed] or unminifier. However, to achieve its goals, minification sometimes uses techniques also used by obfuscation; for example, shortening variable names and refactoring the source code.

  5. Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Obfuscation_(software)

    In software development, obfuscation is the practice of creating source or machine code that is intentionally difficult for humans or computers to understand. Similar to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code to conceal its purpose ...

  6. Intrusion detection system evasion techniques - Wikipedia

    en.wikipedia.org/wiki/Intrusion_detection_system...

    To obfuscate their attacks, attackers can use polymorphic shellcode to create unique attack patterns. This technique typically involves encoding the payload in some fashion (e.g., XOR-ing each byte with 0x95), then placing a decoder in front of the payload before sending it. When the target executes the code, it runs the decoder which rewrites ...

  7. Data masking - Wikipedia

    en.wikipedia.org/wiki/Data_masking

    Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context.

  8. Category:Software obfuscation - Wikipedia

    en.wikipedia.org/wiki/Category:Software_obfuscation

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us

  9. Cross-site scripting - Wikipedia

    en.wikipedia.org/wiki/Cross-site_scripting

    Prevention strategies for DOM-based XSS attacks include very similar measures to traditional XSS prevention strategies but implemented in JavaScript code and contained in web pages (i.e. input validation and escaping). [17] Some JavaScript frameworks have built-in countermeasures against this and other types of attack — for example AngularJS ...