What is Obfuscation?

17 May, 2019

The purpose of obfuscation is to make something harder to understand. In terms of code, it is made intentionally difficult to follow and/or…

What is Hashing?

15 May, 2019

The purpose of hashing is to ensure integrity. So that if something changes, you know that it’s changed. Hashing takes in an arbitrary input…

What is Encryption?

10 May, 2019

Today’s topic: EncryptionThe purpose of encryption is to transform data in order to keep it secret from others. For example, securely…

What is Encoding?

08 May, 2019

The purpose of encoding is to transform data so that it can be properly consumed by a different type of system. The goal is not to keep…

How Does Token Based Authentication Work?

06 May, 2019

JSON web tokens are text strings that can be used by a client and server to authenticate and share information easily. The main purpose of…

How Does Cookie Based Authentication Work?

01 May, 2019

Cookie-based authentication is stateful. This means that an authentication record or session must be kept both on server and client-side.The…

3 Types of Authentication Factors

30 April, 2019

Authentication factors are the ways in which a user can be authenticated (verified that they are who they say they are).There are 3 factors…

Authentication vs Authorization

29 April, 2019

Simply put, authentication is verifying a user's identity while authorization is verifying what a user has access to.Authentication is about…

Cross-site Scripting (XSS)

26 April, 2019

Today’s topic: Cross-site scripting (XSS)Cross-site scripting is when an attacker injects client-side scripts into a web page that can be…

HTTP vs HTTPS

25 April, 2019

Today’s topic: HTTP vs HTTPSHTTP is a clear text protocol which means when we send information from the client to a server, it’s in plain…

The Importance of Logging

24 April, 2019

Today’s topic: The Importance of LoggingOne of the biggest security issues is called insufficient logging. This allows attackers to attacks…

Resume Writing Tips!

19 April, 2019

I finished a first draft of resume and I also published my medium article about resume tips for developers! Check it out!I hope this article…

Injection Attacks

17 April, 2019

Todays topic: What are Injection Attacks?An injection attack allows an attacker to inject code into a program that gives the attacker the…

What is Security Testing?

16 April, 2019

Security testing is a testing technique that determines whether an application can protect its data and maintain its functionality.Security…

The Three Most Common Types of Performance Testing

15 April, 2019

Continuing the performance testing posts, I'll cover the different types today. There are quite a few, I'll talk about the 3 most common…

What is Performance Testing?

11 April, 2019

Let’s talk about performance testing today.🤓 Performance testing is done to ensure that the application under test can perform well under…

Authentication to a Remote Server using SSH keys

18 September, 2018

Hey All! I hope your week is going well so far!! 🔸 Today’s topic is: Authentication to a remote server using SSH keys 🔸 When trying to…

How SSH Connections Work

17 September, 2018

Hi All! Today’s topic is: How SSH connections work 🔸 This will bring together the 3 types of encryption techniques - symmetric encryption…

What is Hashing?

14 September, 2018

Hey All! Todays topic is: Hashing (part 3 out of 4 about SSH connections) 🔸 Once an SSH connection is established, an issue that can occur…

Asymmetrical Encryption

13 September, 2018

Hi All! Todays topic is: Asymmetrical encryption 🔸 Asymmetrical encryption uses two separate keys for encryption and decryption. These two…

Symmetrical Encryption

12 September, 2018

Hey All! I hope you all are having a productive week so far! 👍 🔸 Let’s talk a bit about ssh. SSH (Secure Shell) is a remote administration…

Responsibilities of a Tech Lead

04 September, 2018

Hi All! Let’s talk about tech leads today. If you’re a tech lead or thinking about becoming one, below are some points that you can keep in…

Big O Part 3

13 August, 2018

Part 3 of the Big O notation! We'll review the ones we know - O(1), O(N) and O(log N) plus add some more. O(1) - Random access to a given…

Big O Part 2

11 August, 2018

Big O continued… Today let’s talk about O(log N). It gets a bit ‘mathy’ but stick with me. I’ve seen many interviewers ask questions about…