The state of NoSQL security is about as abysmal as the state of security in RDBMS systems.... more »
Nowadays it has become mandatory to Gzipping the APIs response due to huge amount of data we are sending in response.
Consider a pentesting scenario where you are working with a web application that uses Content... more »
After writing my last post about Pattern matching in Scala, I was curious about how pattern... more »
HTML Tags with examples of tables, forms, anchor, image, heading, marquee, text area,... more »
Cross Site Scripting, or XSS, is a fairly common vector used to attack web sites. It involves... more »
Discover best practices and the most useful tools for building the ideal integration architecture.