Author : Reetesh Gupta

310 posts

APIs have become omnipresent in the world of software and mobile app development. Right from private solutions to public-facing services apps and partner integrations, it is present everywhere. They are helping developers in creating apps that caters to diverse set of customer needs. They are transforming the architectural patterns with much sophisticated approach of mobile …
SQL Injection (SQLi) is a type of an injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass application security measures. They can go around authentication and authorization of a web page or web application and retrieve the …
What are Barcodes? A barcode is a method of representing data in a visual format of machine-readable information about the item to which it is attached. A barcode represent data by varying in widths and spacing of parallel lines. Nowadays, the barcode is referred to as a linear or 1-dimensional code, that can be scanned …
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed. Distributed Denial of …
What is An SQL Injection Vulnerability? Within this blog post we are trying to shed a light on the technical aspects of SQL injections and what you can do to effectively avoid them. Non-Technical Explanation of the SQL Injection Vulnerability Imagine a fully-automated bus that functions based on instructions given by humans through a standard …
How To Setup Cron Jobs In Magento 2 Via SSH And Cpanel Clearly, from the viewpoint of management, the importance of automatic running the routine maintenance jobs in the background is undeniable. Since then, Linux Cron utility is an effective way to schedule a routine background job at a specific time and/or day on an on-going …
Google Authenticator is a two-step verification software used to keep your Google account and its related apps and programs more secure. You can download Google Authenticator as a smartphone app and use it when logging into Google apps and programs You should have two-factor authentication (2FA) turned on wherever you can, but there’s a more …
What is Parameter Store?
Introduction Amazon Web Services (AWS) has an extremely wide variety of services which cover almost all our infrastructure requirements. Among the given services, there is AWS Systems Manager which is a collection of services to manage AWS instances, hybrid environment, resources, and virtual machines by providing a common UI interface for all of them. Services …
open vpn
Introduction Want to access the Internet safely and securely from your smartphone or laptop when connected to an untrusted network such as the WiFi of a hotel or coffee shop? A Virtual Private Network (VPN) allows you to traverse untrusted networks privately and securely as if you were on a private network. The traffic emerges …
The OpenVPN protocol is responsible for handling client-server communications. Basically, it helps establish a secure “tunnel” between the VPN client and the VPN server. When OpenVPN handles encryption and authentication, it uses the OpenSSL library quite extensively. Also, OpenVPN can use either UDP (User Datagram Protocol) or TCP (Transmission Control Protocol) to transmit data. If …
PAGE TOP
error

Enjoy this blog? Please spread the word :)

RSS
Follow by Email