Nicolas FränkelforApache APISIXapisix.hashnode.dev·Sep 28, 2023Down the rabbit hole of an Apache APISIX pluginMy demo, Evolving your APIs, features a custom Apache APISIX plugin. I believe that the process of creating a custom plugin is relatively well-documented. However, I wanted to check the parameters of the _M.access(conf, ctx) function, especially the ...Discuss·21 likesDevops
Kasturi Mukherjeekmukherjee.hashnode.dev·Sep 25, 2023Data Cleaning in Power BIWe connect data in Power BI from many sources so an important part of Power BI or while analyzing the data is Data Cleaning. Below are some points of the Data Cleaning Process: Promoting the Column Header in the data set. Need to check if the firs...Discussdata analysis
Kgothatso Mampyekgothatso.hashnode.dev·Sep 23, 2023Take the role of a Business Analyst with your FirstStoreFirstStore.io helps you become a business analyst (BA) which is a professional who works within an organization to identify business needs and find technological solutions to business problems. Their main responsibilities often include: Requirements ...Discussanalysis
Sue Donimussue.hashnode.dev·Sep 13, 2023Examining The Flagpole DilemmaIntroduction A well-known hypothetical in libertarian circles is the flagpole dilemma. The way I present it is that a man, A, accidentally slips and falls through an open window in his office. The only way that he can prevent himself from falling to ...Discuss·60 readsdilemma
K Willd4nsix.com·Sep 9, 2023Unveiling the Inner Analyst: Navigating the Cognitive LabyrinthThe first major thing you’ll learn about Digital Forensics/Incident response is LOGS LOGS LOGS. Without them, you can't explain what generated the alert or what occurred on the device(downloads, unsolicited changes, etc.)At the Enterprise level, it's...Discussdigitalforensics
Paweł Puchalskipawel-puchalski.com·Sep 4, 2023The Worrying Side of Stack Overflow: A Personal Analysis With BigQuery's Public DataStack Overflow is an invaluable resource for developers worldwide. It’s the go-to place to find answers, share knowledge, and contribute to the collective wisdom of the programming community. But, like any platform, it has its strengths and weaknesse...DiscussStack Overflow
Nguyễn Đăng HưngforBlueCyber's blogbluecyber.hashnode.dev·Sep 2, 2023[Step-by-step analysis] - x86 Formbook within a .NET wrapperXloader - the next-generation Formbook, is a sophisticated strain of Stealer malware designed to steal user information, operating as MaaS (Malware as a Service), with an extremely affordable price that attackers must pay, which is only around $59 pe...Discuss·59 readsMalware
Zeroday Co., Ltd.zeroday.hashnode.dev·Aug 28, 2023How IAST Can Help in Malware AnalysisInteractive application security testing (IAST) can help with malware analysis in several ways: IAST tools monitor applications in runtime to detect potential threats and malicious behaviors: Exfiltrating sensitive dataInjecting codeMaking insecure n...DiscussTesting
x86kingfischer (Daz)x86kingfischer.hashnode.dev·Aug 21, 2023Analysis of the "Debugging Interface" HTB ChallengeIn the course of my recent penetration testing endeavours, I encountered an intriguing challenge named "Debugging Interface" on HTB created by "diogt". The primary objective was to decipher the contents of a file named debugging_interface_signal.sal....Discusshtb
Antoine LOIZEAUblog.smartcloudarchitect.fr·Aug 21, 2023Comment activer les logs Terraform ?Au cours des dernières années, j'ai consacré beaucoup de temps à travailler avec Terraform, ce qui m'a permis d'accumuler des connaissances et comptétences nécessaires pour répondre à différentes situations et besoin d'entreprises. Je continue de fai...Discuss·146 readsTerraformTerraform