admin

About admin

This author has not yet filled in any details.
So far admin has created 29 blog entries.

10 Interesting Facts about Mysql

1. MySQL was created by a Swedish company, MySQL AB, founded by David Axmark, Allan Larsson and Michael “Monty” Widenius.   2. The name MySQL owes its name to co-founder Michael “Monty” Widenius’s daughter My.   3. The first version of MySQL appeared on 23 May 1995. It was initially created for personal usage from

By |2019-02-05T13:34:22+00:00February 5th, 2019|custom blog|

10 Interesting facts about OpenOfffice

1. OpenOffice.org (OOo), commonly known as OpenOffice, is a discontinued open-source office suite. It was an open-sourced version of the earlier StarOffice.   2. In August 1999, Star Division was acquired by Sun Microsystems for US $59.5 million, as it was supposedly cheaper than licensing Microsoft Office for 42,000 staff.   3. Sun open-sourced the

By |2019-02-05T13:33:08+00:00February 5th, 2019|custom blog|

Sh00t – Security Testing Tool for Manual Penetration Testers

Sh00t is a Testing Environment for Manual Security Testers. It acts as a task manager to let testers focus on performing security testing. The biggest advantage is, it helps to create bug reports with customizable bug templates. Its one of the feature is to work as a Dynamic Task Manager to replace simple editors or

By |2019-02-05T13:31:26+00:00February 5th, 2019|custom blog|

Auto Deployment with Gitlab CI/CD and Pipelines in Docker Containers

GitLab CI (Continuous Integration) service is to build and test the software whenever developer pushes code to repository. GitLab CD (Continuous Deployment / Delivery) is a software service that makes the changes of code in the staging / production which results in every day deployment of staging and production. We are going to achieve following

By |2019-04-08T08:48:55+00:00February 5th, 2019|custom blog|

Who’s using React js?

The digital world is changing as we speak. In such reality, it is definitely hard to adapt to trends. However, that is exactly what the big names in the industry are doing. Major apps like Facebook, Instagram, Netflix and others are constantly improving their experience and adapting to new frameworks and trends. As of recently,

By |2018-12-11T11:41:57+00:00December 10th, 2018|custom blog, React Js|

Security Header – Ignored X-Frame Options

What is Clickjacking Clickjacking is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. For example, imagine an attacker who builds a web site

By |2018-12-11T11:36:51+00:00December 10th, 2018|custom blog, Web Application Security|

Security Header : Why X-XSS Protection is important

What is X XSS protection? The HTTP X-XSS-Protection response header is a feature of Internet Explorer, Chrome and Safari that stops pages from loading when they detect reflected cross-site scripting (XSS) attacks. This header enables the Cross-site scripting (XSS) filter built into most recent web browsers. It’s usually enabled by default anyway, so the role

By |2018-12-11T11:36:36+00:00December 10th, 2018|custom blog, Web Application Security|

webRTC – Future is Here

What is webRTC WebRTC (Web Real Time Communication) is an Application Programming Interface (API) developed by the W3C that is still on development and being standardized by the RTCWEB IETF group. Its main goal is to allow peer-to-peer communication between web browsers. This communication can be used to transfer multiple type of data: files, video

By |2018-12-11T11:36:15+00:00December 10th, 2018|custom blog, Linux, Web Application Security|

SambaCry Vulnerability – Remote Code Execution Vulnerability in Linux

A seven-year-old remote code execution vulnerability that is affecting Samba versions 3.5.0 and higher is making news this week. The vulnerability is billed as the WannaCry equivalent for *nix operating systems, and some are even calling it SambaCry since it affects the SMB protocol implementation and is potentially wormable – which can cause it to

By |2018-12-11T11:35:43+00:00December 10th, 2018|custom blog, Linux, Web Application Security|

Chat - SplenGini

SplenGini is Typing...