In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Red Hat Enterprise Linux OS Baseline Security Standard 2.0
To view the contents of this post, you must be authenticated and have the required access level.
Red Hat Enterprise Linux OS Baseline Security Standard 1.0
To view the contents of this post, you must be authenticated and have the required access level.
Cent OS Baseline Security Standard 2.0
To view the contents of this post, you must be authenticated and have the required access level.
Cent OS Baseline Security Standard 1.0
To view the contents of this post, you must be authenticated and have the required access level.
Windows 2016 Baseline Security Standard v2.1
To view the contents of this post, you must be authenticated and have the required access level.
Windows 2016 Baseline Security Standard v1.1
To view the contents of this post, you must be authenticated and have the required access level.
Oracle 12c Database Baseline Security Standard 1.0
To view the contents of this post, you must be authenticated and have the required access level.
SAP-MSSQL 2016 Database Baseline Security Standard 1.0
To view the contents of this post, you must be authenticated and have the required access level.
MSSQL 2016 Database Baseline Security Standard 1.0
To view the contents of this post, you must be authenticated and have the required access level.