How outgoing tunnels are not stopped by AV or firewalls?

How can an attacker with initial access to a server behind a firewall, which only has SSH, HTTPS, and HTTP ports open, maintain remote access to the server even after the SSH port is closed by the user on the firewall?

I have searched these questions and answers but none of them directly answering the question:

I knew its by implementing any kind of reverse shell, creating a tunnel that sending outbound connection to attacker server:
Why a tunnel – reverse shell not detected by Firewall or such Antivirus on the OS? until this point, I worked on many computers and tested if a tunnel works or not, none of them blocked me even with enterprise firewall and client security software.

Continue reading How outgoing tunnels are not stopped by AV or firewalls?

is it safe to allow external images to be attached to Blog or any Web content?

I am filtering all images that attached to any content of my blog:

Check for file extension.
Check content type using $finfo = finfo_open(FILEINFO_MIME_TYPE);
I also save the image temporary on my server and check the size … Continue reading is it safe to allow external images to be attached to Blog or any Web content?

How to secure or (Ensuring Integrity) of Web Data in transit and in store?

Consider (usual scenario) You own a Shopping Cart Website and hosted on Internet, now, your hosting company provides you database to store your data.
If talking about security, we need it for:

Securing Files and Folders on the server (Ac… Continue reading How to secure or (Ensuring Integrity) of Web Data in transit and in store?