top of page
Mar 1, 20216 min read
AWS Database Migration Service
AWS Database Migration Service can migrate your data to and from most of the widely used commercial and open source databases.
55 views0 comments
Feb 16, 20216 min read
Broken Access Control
Developers frequently underestimate the difficulty of implementing a reliable access control mechanism.
78 views0 comments
Feb 13, 20219 min read
How to Avoid SQL Injection Vulnerabilities
Primary Defenses:
Use of Prepared Statements (with Parameterized Queries)
Use of Stored Procedures
Whitelist Input Validation
Escaping All U
30 views0 comments
Feb 13, 20212 min read
Injection
SQL injection errors occur, when data enters a program from an untrusted source, where data used to dynamically construct a SQL query
12 views0 comments
Feb 11, 20215 min read
Security Vulnerabilities in Modern Web Applications
Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unau
45 views0 comments
Feb 10, 20211 min read
How to Check MD5 Checksum in macOS Terminal
Checking the MD5 Checksum of a file ensures the file you are downloading is not corrupted and you are getting exactly what you are...
392 views0 comments
Feb 10, 20213 min read
What is Spring Framework
The Spring Framework is an application framework and inversion of control container for the Java platform. Most of the new generation of...
10 views0 comments
Feb 8, 20212 min read
Amazon Corretto 15
What is Amazon Corretto Corretto is a reliable build of OpenJDK with the assurance of long-term support provided at no cost to you. In...
20 views0 comments
Feb 2, 20215 min read
Migrating to Java 11 from 8
It is high time to migrate to Java 11, if you are not do it now. Migrate #Java8 to #Java11 now itself, this post has got you covered. We...
305 views0 comments
bottom of page