Prevent Spring Boot Api from XSS AttacksCross-site script attacks a code injection attack. The attacker aims to execute malicious scripts in a web browser. This script can be…Mar 9, 2024Mar 9, 2024
Microservice Architecture and Safety Considerations — Part 1As we know Microservice applications are deployed in separate services in a cloud environment. Each service API is exposed in a different…Aug 13, 2023Aug 13, 2023
How To Find And Do Work That You Love (Ikigai)Ikigai is a Japanese concept referring to having a direction or purpose in life, providing a sense of fulfillment and towards which they…May 27, 2021May 27, 2021
Ethical HackingEthical hacking, also known as White hat or penetration testing or pen testing, is legally breaking into computers and devices to test an…May 27, 2021May 27, 2021
Automation Testing & SeleniumAutomation Testing or Test Automation is a software testing technique that performs using special automated testing software tools to…Jan 19, 2021Jan 19, 2021
SDLC Methodologies and Advantages and DisadvantagesThe Software Development Life Cycle (SDLC) is the software development world’s spellcheck — it can flag errors in software creation before…Nov 19, 2020Nov 19, 2020
Software development life cycleSDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to…Nov 17, 2020Nov 17, 2020
Software LicensingA Software license is a legal instrument allowing consumer to use or redistribute the software. software license is typically provide one…Sep 8, 2020Sep 8, 2020
MSI GL Leopard Series :-ReviewMSI GL65 is giving best experience to gamers and developers.it is Evolve and Start Ahead. Choose the Dragon Spirit with the latest MSI…Aug 17, 2020Aug 17, 2020
Ethical Whistle blowingA whistleblower is a person who exposes secretive information or activity within a private or public organization that is deemed illegal…Jul 25, 2020Jul 25, 2020
How Web Browsers WorkThe browser’s main purpose is present resources according the our requests. by requesting it from the server and displaying it on the…Jul 16, 2020Jul 16, 2020
Modern Cars And ComputersComputers is the key to today vehicle’s deepest secrets. The Controller Area Network, or CAN, is incredibly complex, but here’s what…Jun 11, 2020Jun 11, 2020
Linux DistributionsLinux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on…Apr 26, 2020Apr 26, 2020
Windows Small blogWindows is a oldest and most peoples using operating system in world widely.Windows has two types of Operating system Windows NT for…Apr 7, 2020Apr 7, 2020