What is Obfuscation?
17 May, 2019The purpose of obfuscation is to make something harder to understand. In terms of code, it is made intentionally difficult to follow and/or…
What is Hashing?
15 May, 2019The purpose of hashing is to ensure integrity. So that if something changes, you know that it’s changed. Hashing takes in an arbitrary input…
What is Encryption?
10 May, 2019Today’s topic: EncryptionThe purpose of encryption is to transform data in order to keep it secret from others. For example, securely…
What is Encoding?
08 May, 2019The purpose of encoding is to transform data so that it can be properly consumed by a different type of system. The goal is not to keep…
How Does Token Based Authentication Work?
06 May, 2019JSON web tokens are text strings that can be used by a client and server to authenticate and share information easily. The main purpose of…
How Does Cookie Based Authentication Work?
01 May, 2019Cookie-based authentication is stateful. This means that an authentication record or session must be kept both on server and client-side.The…
3 Types of Authentication Factors
30 April, 2019Authentication factors are the ways in which a user can be authenticated (verified that they are who they say they are).There are 3 factors…
Authentication vs Authorization
29 April, 2019Simply put, authentication is verifying a user's identity while authorization is verifying what a user has access to.Authentication is about…
Cross-site Scripting (XSS)
26 April, 2019Today’s topic: Cross-site scripting (XSS)Cross-site scripting is when an attacker injects client-side scripts into a web page that can be…
HTTP vs HTTPS
25 April, 2019Today’s topic: HTTP vs HTTPSHTTP is a clear text protocol which means when we send information from the client to a server, it’s in plain…
The Importance of Logging
24 April, 2019Today’s topic: The Importance of LoggingOne of the biggest security issues is called insufficient logging. This allows attackers to attacks…
Resume Writing Tips!
19 April, 2019I finished a first draft of resume and I also published my medium article about resume tips for developers! Check it out!I hope this article…
Injection Attacks
17 April, 2019Todays topic: What are Injection Attacks?An injection attack allows an attacker to inject code into a program that gives the attacker the…
What is Security Testing?
16 April, 2019Security testing is a testing technique that determines whether an application can protect its data and maintain its functionality.Security…
The Three Most Common Types of Performance Testing
15 April, 2019Continuing the performance testing posts, I'll cover the different types today. There are quite a few, I'll talk about the 3 most common…
What is Performance Testing?
11 April, 2019Let’s talk about performance testing today.🤓 Performance testing is done to ensure that the application under test can perform well under…
Authentication to a Remote Server using SSH keys
18 September, 2018Hey All! I hope your week is going well so far!! 🔸 Today’s topic is: Authentication to a remote server using SSH keys 🔸 When trying to…
How SSH Connections Work
17 September, 2018Hi All! Today’s topic is: How SSH connections work 🔸 This will bring together the 3 types of encryption techniques - symmetric encryption…
What is Hashing?
14 September, 2018Hey All! Todays topic is: Hashing (part 3 out of 4 about SSH connections) 🔸 Once an SSH connection is established, an issue that can occur…
Asymmetrical Encryption
13 September, 2018Hi All! Todays topic is: Asymmetrical encryption 🔸 Asymmetrical encryption uses two separate keys for encryption and decryption. These two…
Symmetrical Encryption
12 September, 2018Hey All! I hope you all are having a productive week so far! 👍 🔸 Let’s talk a bit about ssh. SSH (Secure Shell) is a remote administration…
Responsibilities of a Tech Lead
04 September, 2018Hi All! Let’s talk about tech leads today. If you’re a tech lead or thinking about becoming one, below are some points that you can keep in…
Big O Part 3
13 August, 2018Part 3 of the Big O notation! We'll review the ones we know - O(1), O(N) and O(log N) plus add some more. O(1) - Random access to a given…
Big O Part 2
11 August, 2018Big O continued… Today let’s talk about O(log N). It gets a bit ‘mathy’ but stick with me. I’ve seen many interviewers ask questions about…