Aditya Ladadityaladblog.hashnode.dev·Feb 27, 2024SQL injection attackIntroduction:- It involves inserting SQL Queries through user input to manipulate the database. Successful exploitation can result in: Reading sensitive data from the database. Modifying database entries through insert, update, or delete operati...Discuss·10 likes·31 reads#sqlinjection
Musaib Altafmusaaib.hashnode.dev·Jan 12, 2024Securing Your Django Admin: A Comprehensive Guide to Creating a 2FA Security System for the Django Admin PanelThere was an era where atomic and nuclear weapons were considered the most destructive paraphernalia and no doubt they are, but the era has changed and so has the definition of the most destructive weapons. Now, the clock of destruction ticks one and...Discuss·2 likes·146 readsdjangosecurity
George Mbuguanguregeorge.hashnode.dev·Aug 4, 2023Data science MethodologiesData has established itself as the driving force in this era of machines and mechanical growth. Every organization, whether it be a financial institution or a health organization, is moving towards data solutions. How are we leveraging our data to ad...Discuss·1 likeData Science