Deevanshu Kushwahwearedev.hashnode.dev·Jul 14, 2024SSH Basics: Everything You Should KnowHey folks, 👋 In this blog, we'll guide you through generating SSH keys and securely connecting to a remote machine. By the end of this article, you'll be well-equipped and excited to use SSH for your remote connections. 🚀 What is SSH? 🤔 SSH is a s...Discuss·10 likesremote machine
Pranav Bawgikarpranavbawg.hashnode.dev·Jul 2, 2024Robust programming to bomb-proof your code[15] Introduction Secure programming is a type of coding that focuses on preventing known vulnerabilities. However, robust programming takes it a step further. It emphasizes building well-structured programs that anticipate and handle the potential p...DiscussRobust Programming
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Jun 24, 2024Attacking GolangGolang (or Go) is a statically typed, compiled programming language designed at Google. It is known for its simplicity, efficiency, and strong performance. However, like any programming language, improper coding practices in Go can lead to security v...Discuss·453 readsgolang
Raicode.flatmarstheory.com·May 30, 2024Mastering Pointers in CIn the ever-evolving landscape of software development, where artificial intelligence (AI) and supercomputers are pushing the boundaries of what's possible, the importance of secure and robust programming practices cannot be overstated. One foundatio...DiscussC
Asis Sharmaasis-sharma.hashnode.dev·May 12, 2024Level Up Your Security: Policy-Based Authorization in Action!Have you ever felt the need for more granular control over who can access what on your website? Maybe you're tired of hardcoding access rules or want a more flexible way to manage user permissions. Well, fear not, fellow developers, because policy-ba...Discuss#policybasedauthorization
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·May 6, 2024Attacking JavaAttacking Java applications requires a nuanced understanding of both the language's intricacies and common vulnerabilities prevalent in its ecosystem. Java, renowned for its platform independence and robustness, also presents a wide surface area for ...Discuss·1 like·617 readsJava
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Apr 29, 2024Attacking PHPIn modern PHP applications, attackers exploit various vulnerabilities to compromise systems, steal data, or disrupt services. One prevalent attack vector is SQL injection, where malicious SQL commands are injected into input fields to manipulate data...Discuss·858 readsPHP
Abraham Dominic NewtonforAbraham Dominic Newtonabrahamdominic.hashnode.dev·Apr 22, 2024Leveling Up: Blockchain and Gaming's Thrilling AllianceIntroduction: In the dynamic world of technology, where innovation is the name of the game, blockchain is making waves that extend far beyond cryptocurrencies. One particularly exciting frontier is the intersection of blockchain and gaming, a space w...DiscussTransprency
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Apr 22, 2024Attacking NodeJS ApplicationWhen it comes to securing Node.js applications, understanding potential attack vectors is paramount. Node.js, with its asynchronous and event-driven architecture, offers great performance and scalability, but it also introduces unique security challe...Discuss·1 like·1.0K readsNode.js
Sarang Deshpandesarangcharthankar.hashnode.dev·Apr 20, 2024The Crucial Dance of Frontend and Backend Validations in Application SecurityIn the world of web development, data is king. It fuels our applications, allows for user interaction, and ultimately determines the success of our creations. But just like a king needs loyal guards to protect his castle, our data needs robust valida...Discussdevina