by Tracy Koenn | May 4, 2022 | Uncategorized
Deployment Strategies: 6 Explained in Depth For every software development firm, there comes a time when their software will need to be changed or upgraded. It can come in the form of a total version change or fixing a bug found in the original version.Now that the...
by Tracy Koenn | Apr 27, 2022 | Uncategorized
What is Kubernetes? Everything You Need to Know Containers have become the norm for creating standard applications. Clients and engineers don’t like downtime in the production environment, and recently, several organizations have adopted containers as a solution. The...
by Tracy Koenn | Apr 20, 2022 | Uncategorized
Spring Broken Object Level Authorization Guide: Examples and Prevention If a malicious user gains access to functionality that only system administrators should have access to, there can be dire consequences. This post is about a specific type of vulnerability called...
by Tracy Koenn | Apr 13, 2022 | Uncategorized
Spring XML External Entities Guide: Examples and Prevention XML is a markup language that we use to define and categorize data. Data stored in XML format can move between multiple servers or between a client and a server. Once a server receives an XML input, it parses...
by Tracy Koenn | Apr 6, 2022 | Uncategorized
xUnit vs. NUnit Demystified: A Comprehensive Explanation Getting started with unit testing can seem like a daunting task. There’s plenty to learn, such as what unit testing is in the first place and why it’s valuable, what the best practices are when writing tests,...
by Tracy Koenn | Mar 29, 2022 | Uncategorized
Rails Broken Object Level Authorization Guide Broken object-level authorization, or BOLA, is a specific attack that targets weak or poorly implemented authorization mechanisms. It exploits endpoints that allow user input to retrieve objects (data) and have no user...