-
Importance of family support in an Indian professional’s life
- April 6, 2021
- Posted by: Neha Chadha
- Category: Blogs
No CommentsAditya stays in an apartment in Noida and works as a Software Engineer and his wife Naina works as a Teacher in a Convent School. They have a son named… -
10 Ways to Speed Up Test Automation Using a CI/CD Pipeline
- March 16, 2021
- Posted by: Tanvir
- Category: Blogs
Changing user expectations and rising business demands have had a wider impact on the software development lifecycle. This has resulted in an increase in demand for rapid innovation, followed by… -
3 DevOps skills to master in 2021
- February 23, 2021
- Posted by: Tanvir
- Category: Blogs
In the past few months, companies had to learn to transition rapidly to virtual operations and to communicate not just with their teams but also with their entire ecosystem. This… -
The Svelte Handbook: The Detailed Guide
- February 1, 2021
- Posted by: Rupesh Raj
- Category: Blogs
The Svelte Handbook: The Detailed Guide “The only way to go fast is to go well.” -Robert C. Martin aka Uncle Bob It is a well-known fact that react, angular,… -
What is a Second-Order SQL Injection and how to identify Attack Scenario, Potential Impact and Remediation!
- January 18, 2021
- Posted by: Vinayak Sakhare
- Category: Blogs
What is SQL Injection? SQL Injection — the process of injecting SQL language code within data requests that result in application backend database server either surrendering confidential data or cause… -
5 Team-building activities to make remote meetings more engaging in 2021
- January 8, 2021
- Posted by: Tanvir
- Category: Blogs
Remember when you could go to a colleague’s office to ask a question! Or you could quickly bring a team together for an emergency brainstorming session! Today, COVID-19 has put… -
Methods to bypass a 2FA in Web/Mobile Applications
- November 18, 2020
- Posted by: Tanvir
- Category: Blogs
Two-factor authentication (2FA) adds an extra layer of security to the login accounts by asking for a verification code after you sign in with your email address and password. Two-Factor… -
CSRF token? Why not try to bypass it?
- November 18, 2020
- Posted by: Tanvir
- Category: Blogs
Cross-Site Request Forgery (aka CSRF) attack is one of the common web application security vulnerabilities. The application uses an anti-CSRF token to prevent this attack, but due to improper validation… -
Bug in Android, StrandHogg 2.0
- November 18, 2020
- Posted by: Tanvir
- Category: Blogs
Experts have found a major vulnerability that affects all devices running on Android 9.0 and earlier. Let us see what this vulnerability is all about and its impact on the… -
A4CloudStack
- November 11, 2020
- Posted by: Tanvir
- Category: Blogs
Introduction: A4CloudStack is an easy to use python-based automation framework that can be used for performing cloud sysops functions as well as testing AWS cloud platform services. Features: A4CloudStack has…