Aug 11, 2025 · 3 min read · When working with enums in C#, we usually think of them as a list of distinct values. However, there are situations where a variable should represent a combination of multiple enum values at the same time — for example, user permissions, file access ...
Join discussion
Apr 7, 2025 · 2 min read · Overview URL parameters (also called query strings) allow developers and testers to modify webpage behavior dynamically by appending key-value pairs to the URL. This technique is useful for debugging, testing, and diagnosing issues without altering s...
Join discussionSep 29, 2024 · 2 min read · In this project, I’ll be working on completing a small lab about vulnerability management by scanning a vulnerable (VM) Virtual Machine - Metasploitable 2 - from Rapid7 using a Nmap scanning tool running on Kali Linux. “Metasploitable 2 is an intenti...
Join discussion
Jun 16, 2024 · 3 min read · Hey there, tech adventurers! Welcome to my blog! Today, we're diving headfirst into the thrilling world of Capture the Flag (CTF) challenges. Whether you're a complete newbie to cybersecurity or a seasoned pro looking to sharpen your skills, this wal...
Join discussion