top of page
This site was designed with the
.com
website builder. Create your website today.
Start Now
Home
Blog
Contact
More
Use tab to navigate through the menu items.
WYNNESTGROUP@GMAIL.COM
WG WEB SOLUTIONS
Our Recent Posts
How to run Javascript in command prompt
Simple example to understand OWASP TOP 10 Application Security Risk 2017 II
Simple example to understand OWASP TOP 10 Application Security Risk 2017 I
Archive
October 2017
(3)
3 posts
September 2017
(2)
2 posts
August 2017
(2)
2 posts
July 2017
(1)
1 post
June 2017
(2)
2 posts
Tags
CSS3
(1)
1 post
HTML5
(1)
1 post
IE8
(1)
1 post
JAXB
(1)
1 post
JavaScript
(3)
3 posts
Marshaller
(1)
1 post
ReferanceError
(1)
1 post
SEO
(1)
1 post
Unmarshaller
(1)
1 post
XML
(1)
1 post
XMLType
(1)
1 post
appendAllowed
(1)
1 post
application security
(2)
2 posts
autodetect currency and language
(1)
1 post
boost web traffic
(1)
1 post
customitemwriter
(1)
1 post
extension
(1)
1 post
flatfilefootercallback
(1)
1 post
flatfileheadercallback
(1)
1 post
flatfileitemreader
(1)
1 post
google search engine
(1)
1 post
htmlshiv.js
(1)
1 post
is not defined
(1)
1 post
jdbccursoritemreader
(1)
1 post
key phrase
(1)
1 post
mobile-friendly
(1)
1 post
multiresourceitemreader
(1)
1 post
node.js
(1)
1 post
opencart
(1)
1 post
owasp
(2)
2 posts
participants database
(1)
1 post
plugin
(1)
1 post
respond.js
(1)
1 post
security
(2)
2 posts
selectivizr.js
(1)
1 post
social media
(1)
1 post
spring batch framework
(2)
2 posts
stepexecutionlistener
(1)
1 post
vulnerabilities
(1)
1 post
web traffic
(1)
1 post
wordpress
(1)
1 post
How to run Javascript in command prompt
Node.js® is a JavaScript runtime built on Chrome's V8 JavaScript engine. If you need to run a Javascript file in command prompt, you may...
Simple example to understand OWASP TOP 10 Application Security Risk 2017 II
A7 – Insufficient Attack Protection This was a new added vulnerable. When attack was happened, how fast can your team react and roll out...
Simple example to understand OWASP TOP 10 Application Security Risk 2017 I
A1 – Injection Attackers are trying to use malicious code and input into the application to form a valid command or query. One of the...
bottom of page