Uncategorized Archives - Page 2 of 3 - Shezartech
1
archive,paged,category,category-uncategorized,category-1,paged-2,category-paged-2,mkd-core-1.0.2,sparks child-child-ver-1.0.0,sparks-ver-1.5,mkd-smooth-scroll,mkd-smooth-page-transitions,mkd-ajax,mkd-grid-1300,mkd-blog-installed,mkd-header-standard,mkd-sticky-header-on-scroll-down-up,mkd-default-mobile-header,mkd-sticky-up-mobile-header,mkd-dropdown-default,mkd-header-style-on-scroll,mkd-full-width-wide-menu,mkd-header-standard-in-grid-shadow-disable,wpb-js-composer js-comp-ver-6.0.3,vc_responsive

Uncategorized

Mobile applications send various types of requests to their servers which traverse over a network. Some requests are of HTTP type. They perform functions like requesting resources, gaining access, terminating a user session. Whether a request gets served or not depends on how the server is configured. It is...

Mobile applications and their backend servers communicate with each other over a network. Secured Socket Layer (SSL) and Transport Layer Security (TSL) protocols are most commonly used for authentication and security. Even though the Data is encrypted, these protocols have a few vulnerabilities. It is possible to intercept a...

Mobile applications and their backend web applications communicate with each other over a network. Both entities verify each other’s identity before engaging in dialogue. When a mobile app contacts its server for the first time, the server creates a cookie at the client-side. The cookie...

Mobile applications have backend servers running on remote computers. Apps and servers communicate with each other frequently. Servers often pass cookies to mobile apps at the beginning of a session.  Mobile apps would integrate the cookie in each subsequent dialogue with servers until the user...

A mobile app frequently communicates with its backend running on a remote server. The mobile app or the server may initiate communication.  Such conversation comprises of service/data requests, updates, and acknowledgment for responses received from the other end. It is necessary to verify identity in...

Mobile applications access many hardware components as well as data present on devices. Apps must do so to execute their functions. Users are asked to grant the required access permission(s) explicitly when an app installs. Giving access to the device hardware and data can have unwanted implications if...

As the name suggests, account lockout feature bars access to the account. The access may be denied for a fixed time or until it is restored. Many ways are available for restoration. Entering a onetime password, access restore from the backend, and CAPTCHA test is...

Mobile applications often require users to authenticate themselves. This verification is vital, for the app may contain confidential data. A person with malicious intent may use such information to exploit the legitimate owner of the data. The most common authentication mechanism is asking for a username and a password....

Obfuscation is the process of making something obscure or unclear. While developing a mobile app, it is necessary to make the source code unintelligible when releasing an app. Source code may be left the way it is by the developers because of the lack of awareness about its...

Many mobile applications have authentication mechanisms. Users need to prove identity to gain access to app functionality. This verification is vital for a variety of reasons, like an application may contain users’ personal information, or provide a paid subscription to an online service. Users are...