Sarthak Kulkarnicombustrrr.hashnode.dev·Dec 1, 2024Solving String Permutation Problems in JavaQuestion: Given two strings A and B, check if they can be rearranged to match (i.e., check if they are permutations of each other). Solution: import java.util.Arrays; public class Solution { public int permuteStrings(String A, String B) { ...DiscussAlgorithm Solutions
emptycodesemptycodesalsowrites.hashnode.dev·Jul 10, 2024User Input and Enums in C#An enumeration (enum) in C# is a custom type used when you need to make a choice from a set of possible options. Enums are ideal for representing things that don't fit into one of C#'s default or pre-existing types. Creating an Enum The syntax to cre...Discuss·98 readsC#
Abhishek Sharmaabhisheksharmacodes.hashnode.dev·Jun 30, 2024Input Validation using NodeJS like a ProIn Node.js applications, especially those handling user input, input validation is paramount. It safeguards your server from malicious attacks and ensures data consistency. This post delves into implementing input validation using the popular express...DiscussNode.js
Kshitij Kakadekshitijkakade.hashnode.dev·Apr 1, 2024Understanding and Mitigating XSS Attacks in Web ApplicationsCross-site scripting (XSS) is a menacing threat to web application security, allowing attackers to inject malicious scripts into websites, potentially leading to data theft, session hijacking, and unauthorized activities. This blog post delves into t...Discuss·1 likeFront-end Security
Lokesh Sharmalokeshkavisth.hashnode.dev·Mar 30, 2024Validate forms with NextJS 14, typescript, and ZodNext.js 14, with its emphasis on efficiency and developer experience, makes an excellent platform for developing modern web apps. However, ensuring user input validity is critical to providing a satisfactory user experience. This blog article discuss...Discuss·66 readsnextjs 14
Adaeze Iweadinobi adaeze.hashnode.dev·Feb 22, 2024Code Injection: A HTML PerspectiveIn the realm of web security, HTML Injection stands as a pervasive threat, capable of compromising the integrity and functionality of web applications. In this article, I delve into the intricacies of HTML Injection, its exploitation, preventive meth...Discuss·10 likesHTML İnjection
T Prayagprayagtushar.hashnode.dev·Jan 20, 2024ZOD Library: Mastering Input ValidationBefore delving into ZOD, it's essential to understand the concepts of an input validator and schema. Input Validator: The tool that ensures the data provided meets specified criteria or rules, helping maintain accuracy and integrity. Schema: A schema...Discusszod
Jyotiprakash Mishrablog.jyotiprakash.org·Dec 28, 2023Secure Coding in CWriting secure code in C is crucial to preventing common vulnerabilities such as buffer overflows, injection attacks, and more. Here are some ways to enhance the security of your C code: Input Validation: Ensure that all user inputs are validated an...DiscussC Programmingbounds checking
Bhavesh Yadavcodezera.hashnode.dev·Oct 14, 2023Unleashing the Power of ZODGreetings, tech enthusiasts! In today's blog post, we're diving into the fascinating world of ZOD - a powerful and versatile tool that has been making waves in the tech community. ZOD, short for Zealous Object Definition , is a type-safe schema valid...DiscussJavaScript
Arpit Dwivediblog.arpitdwivedi.in·Oct 12, 2023The Critical Role of Input Validation in Web SecurityIn today's digital age, web applications serve as the backbone of businesses, entertainment, social interactions, and more. Yet, with the increasing reliance on these platforms comes the amplified risk of security breaches. A startling 35% of securit...Discuss·10 likes·118 readswebsecurity