Dhananjay Yadavdhananjayandroid.hashnode.dev·Sep 10, 2023Android application best security practicesThese are some best practices that have a significant, positive impact on your app's security.1. Signing APKs:When you build an Android app, it must be signed with a digital certificate. This process ensures the integrity and authenticity of the app....Discuss·9 likesAndroid
Haithem Mihoubihaithemmihoubi.hashnode.dev·Sep 7, 2023Ethical hacking exampleCertainly, here's a more detailed walkthrough of a penetration testing process for a website along with specific commands and tools commonly used by experienced pentesters. Please remember that ethical hacking should always be conducted with proper a...Discussethicalhacking
Haithem Mihoubihaithemmihoubi.hashnode.dev·Sep 7, 2023Planning and Scoping Penetration Testing: A Comprehensive Guide with ExamplesIntroduction Penetration testing, also known as ethical hacking, is a critical cybersecurity practice that helps organizations identify vulnerabilities and weaknesses in their systems, applications, and networks. To ensure a successful and efficient ...DiscussSecurity
Mejbaur Bahar Fagunfagun.hashnode.dev·Jul 28, 2023Advanced Network Vulnerability Assessment: A Comprehensive Approach Using Bash ScriptIntroduction: In today's digital landscape, where cyber threats are ever-evolving, ensuring robust network security has become paramount for organizations. A crucial aspect of this security strategy is conducting regular vulnerability assessments. Th...Discuss·10 likesCyber Security & Ethical Hackingwebsite testing
RajnishforCling QA Solutions blogsblogs.clingqasolutions.com·Jul 16, 2023The Exhilarating World of Security Testing: Protecting Your Software from Those Pesky Hackers (Or So We Hope) 🕵️♂️🔒Introduction: Welcome to the thrilling and heart-pounding world of security testing, where we don our detective hats and attempt to outsmart the crafty hackers lurking in the shadows. In this blog, we'll embark on a sarcastic and suspenseful journey ...DiscussSecurity
Pritesh Usadadiyasoftwaretestingnotes.hashnode.dev·Jul 3, 2023Issue #92 : Software Testing NotesWe have five new testers added this week on our Tester Profiles Page. They are Varsha, Razvan Vancea, Rodrigo Morteo, Vincent Ferreira and George Ukkuru. Check out their profiles to know what kind of content they create and where they hang around. Do...Discuss·11 likesQA
Nilesh GforWeb Design Agencyweb-design-agency.hashnode.dev·Jul 2, 2023Web Security Best Practices: Protecting Your Website from Cyber ThreatsIn today's digital landscape, web security is of paramount importance. With the increasing prevalence of cyber threats, it's crucial for website owners and developers to prioritize the security of their online assets. This article will explore essent...DiscussSecurity
Nisarg Bhavsarnisargnbhavsar.hashnode.dev·Jun 12, 20237 Steps to Follow for Implementing DevSecOps in Your OrganizationDevSecOps is the process of software development in which security testing is integrated with every stage of software development. It is a practice that encourages collaboration between developers, the operation team, and security specialists, which ...DiscussDevops
Mejbaur Bahar Fagunfagun.hashnode.dev·Jun 10, 2023Understanding SQL Injection for Software QA Engineers! 🕵️♀️💻Introduction: As a Software Quality Assurance (QA) Engineer, your role is crucial in ensuring the security and reliability of software applications. One area that demands your attention is SQL injection. 🚨 In this article, we will dive into the worl...DiscussSoftware Quality Assurance #sqlinjection
Danubius IT SolutionsforDanubius IT Solutions' tech blogdanubius.hashnode.dev·May 23, 2023FeaturedHow may your file uploads get hacked?Shared from Danubius IT Solutions' tech blog. In this blog post, we will cover the most important file input validation techniques on the web, some attacks against them, and highlight the importance of sanitizing data sent by the end user with a case...Discuss·13 likes·88 readsValidation