Security Best Practices for API keySome APIs use API keys for authorization. An API key is a token that a client provides when making API calls. The key can be sent in the…Feb 1, 2021Feb 1, 2021
Buffer Overflow OverviewBuffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. A buffer…Jan 15, 2020Jan 15, 2020
DISTRIBUTED DENIAL-OF-SERVICE PROTECTION — AWSA Distributed Denial of Service (DDoS) attack is a malicious attempt to make a targeted system, such as a website or application…Dec 26, 2019Dec 26, 2019
How to Create a Strong PasswordPasswords are your first line of defense against cybercriminals — some tips and best practices for creating strong passwords.Dec 20, 2019Dec 20, 2019
Pool of Resources for OSCPDuring my prep for OSCP , i have gone through a lot of exhaustive knowledge sharing blogs, git repos etc.Oct 29, 2018Oct 29, 2018
Malware Analysis ResourcesRecently i was exploring about malware analysis and i got pretty good list of the resources. So i thought of sharing so that, if anyone…Aug 6, 20181Aug 6, 20181
Resources for WEB APPLICATION PENETRATION TESTINGWeb Application Penetration TestingJul 22, 2018Jul 22, 2018
Security Guidelines to keep in mind — For developersHere is a list of default security requirements that I would suggest for most software development projects:Jul 20, 2018Jul 20, 2018