Prevent Spring Boot Api from XSS AttacksCross-site script attacks a code injection attack. The attacker aims to execute malicious scripts in a web browser. This script can be…Mar 9Mar 9
Microservice Architecture and Safety Considerations — Part 1As we know Microservice applications are deployed in separate services in a cloud environment. Each service API is exposed in a different…Aug 13, 2023Aug 13, 2023
How To Find And Do Work That You Love (Ikigai)Ikigai is a Japanese concept referring to having a direction or purpose in life, providing a sense of fulfillment and towards which they…May 27, 2021May 27, 2021
Ethical HackingEthical hacking, also known as White hat or penetration testing or pen testing, is legally breaking into computers and devices to test an…May 27, 2021May 27, 2021
Automation Testing & SeleniumAutomation Testing or Test Automation is a software testing technique that performs using special automated testing software tools to…Jan 19, 2021Jan 19, 2021
SDLC Methodologies and Advantages and DisadvantagesThe Software Development Life Cycle (SDLC) is the software development world’s spellcheck — it can flag errors in software creation before…Nov 19, 2020Nov 19, 2020
Software development life cycleSDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to…Nov 17, 2020Nov 17, 2020
Software LicensingA Software license is a legal instrument allowing consumer to use or redistribute the software. software license is typically provide one…Sep 8, 2020Sep 8, 2020