Using Kotlin RecyclerView: The Essential Handbook

RecyclerView is a ViewGroup ideal for displaying dynamic data. An example of such dynamic data is a list of weather forecasts for multiple days. Each item on the list can have properties like the date, temperature, and city for the forecast. With the help of RecyclerView, it is possible to render data by reusing views from items that are no longer visible on the screen. This behavior saves memory and improves the speed and performance of an app. As a result, RecylcerView is the preferred tool for displaying large amounts of data in a list. In this post from Pius Aboyi, you’ll learn about RecyclerView and how to use it in a Kotlin app. See the whole post on Waldo’s blog. 

Create Your First Flutter Barcode Scanner

Today, barcodes can be scanned by not only lasers, but by smartphone cameras too. Many retailers, like Amazon and Home Depot, now include barcode scanners in their apps to enable shoppers to conveniently look up information about products. This improves the shopping experience and helps shoppers find the best prices for products. Other day-to-day experiences are enriched by smartphone readable barcodes, such as exploring a museum. Many museums now include barcodes in exhibits to help visitors retrieve more information via a smartphone to enhance their experience. In this article by Daliso Zuze, you’ll learn about some different types of barcodes, how to create them, and how to build an app in Flutter to scan them using the camera on a smartphone. Head over to Waldo’s blog. 

React Native Device Info: The Essential Guide

Device information is very important for a developer in order to know the types of devices that users are using. To give a better user experience, we need this information. It can also be used to trace the crashes in apps. There’s a lot of device information available to the developer, and there are limitless uses for that info. In this post from Nabendu Biswas on Waldo’s blog, you’ll learn to get various device information in a React Native app.

React Native Grid: Easy Responsive Layouts Step by Step

You can create a grid system in React Native in a lot of ways. One of the best ways to do it is using FlatList, which is provided by React Native. This post is about creating a responsive grid system using FlatList. To implement this, readers should have basic knowledge of JavaScript, React, and React Native. You’ll also be using the awesome no-code testing tool from Waldo to test the application.Check out the whole post from Nabendu Biswas on Waldo’s blog. 

React Native Transforms: Learn by Example

If you come from a web background, you know that CSS transforms are extremely helpful. You can use them to create animations and visually appealing UI elements. In fact, a lot of modern web design is inspired by transforms. React Native comes with default support for transforms. It’s very similar to how transforms work on the web and can be used in a number of scenarios. In this roundup, I’ll break down transforms for you. You’ll understand what they are and how they work, and eventually you’ll learn how to use them in your React Native project. Check it out in this post from Siddhant Varma on Waldo’s blog.

Sound in React Native Apps 101: Tutorial With Examples

Sound in any mobile application is a pleasurable user experience. It’s a must in gaming applications, but also used in a variety of other applications. It also enhances the user experience when we play a small sound on the press of a button or when receiving a notification. In this post, you’ll create a small xylophone app, which will play different sounds when a user presses different buttons. Get started by looking into the full post from Nabendu Biswas on Waldo’s blog.

Cloud Deployment Models: 3 Helpfully Explained

The cloud gives you many benefits. But what if your company can’t move to the cloud yet? Are you doomed to stay with your ordinary on-prem infrastructure? Do you need to forego all the cloud features? Not at all! When we say “running in the cloud,” we usually mean “running in a public cloud,” which is one cloud deployment model. But there are more. And guess what? You can have a “cloud” in your on-prem data center. You can also combine your on-prem system with the public cloud. In this post, you’ll learn about all these different cloud deployment models. Get the answers to all of your questions in this post from Dawid Ziolkowski on Plutora’s blog. 

An Introductory How-To, With Examples, of Docker Exec

Docker exec is a command that allows the execution of any given command within a Docker container. This means it will interpret the arguments passed to it as commands to be run inside the container. Let’s look at a quick example for clarity. The command docker exec CONTAINER ls will execute the command ls inside the container tagged CONTAINER. Looks simple, right? Well, there are a few things to consider, but in general, yes, it is simple. And powerful. Check out this post from Mauro Chojrin on CloudBees’ blog for a detailed discussion of what docker exec is and how to make the most of it.

Django Path Traversal Guide: Examples and Prevention

Django path traversal or directory traversal is a web security vulnerability that gives a remote attacker access to files and directories that are stored outside the specified folder to which the application grants access. The attacker can achieve this by manipulating the files with a “dot-dot-slash” (../) sequence. Another name for path traversal is the “dot-dot-slash attack.” Path traversal is also possible at the Django SSI template tag. It’s possible to manipulate the SSI template tag to gain access to arbitrary files stored in the system. In addition, this manipulation makes it possible for an attacker to know the folder structure of your application. This allows the attacker to copy, read, and modify files stored in these paths. Now, these files might include your application source code, credentials for back-end systems, sensitive information, and data. With this vulnerability, the attacker can sometimes take full control of the server. In this post from Pius Aboyi on Stackhawk’s blog, you can look at some common examples of path traversal and ways to prevent each vulnerability.

Django HTTP Strict Transport Security Guide: What It Is and How to Enable It

Let’s say you’ve scanned your website with a web security tool or received an email from a do-gooder who says you’re missing the HSTS header. At first, this may seem daunting, but it’s technically simple to resolve. All you need is to properly serve TLS traffic over HTTPS and then add a couple of headers to your website. And now you may be wondering what HSTS is and how you can add these headers in Django. Luckily, you landed here—because that’s exactly what this post by Phil Vuollet is about. Learn more on Stackhawk’s blog.

Rust CORS Guide: What It Is and How to Enable It

Let’s say your Rust-language application queries or sends resources from (or to) servers other than the one hosting it. Every time this happens, a cross-origin resource sharing (CORS) operation takes place. This ties in application programming interfaces and their methods as allowable verbs for your application’s browser to recognize and render. This post explores how you can safely implement CORS in Rust-lang contexts. Check it out in this post from Taurai Mutimutema on Stackhawk’s blog.

Angular Open Redirect Guide: Examples and Prevention

I’m sure at some point you’ve been redirected from one site to another. Website redirections are quite commonly used today for a variety of purposes. But when was the last time you paid attention to what site you’re being redirected to? If done right, redirection is as harmless as it sounds. However, in some cases, it can become alarming for you and your users. In this post, Siddhant Varma talks about open redirects—what they are and what impact they can have. Get a deep dive on Stackhawk’s blog.

Node.js Path Traversal Guide: Examples and Prevention

Building secure, robust applications is a craft that requires a lot of consideration and effort. Making sure to cover the extensive list of potential vulnerabilities can be an enormous task that demands experience and guidance. One such vulnerability is the directory access security of our system, which is commonly exploited by path traversal attacks. Understanding that, however, should not deter you from approaching the problem head-on. After all, extensive and very comprehensive resources that can guide you exist all over the net. This article is intended to be one such resource. The purpose of this article is to serve as a guide to understanding path traversal attacks and what approaches we can take to mitigate them with Node.js. Check out the full post from Juan Reyes on Stackhawk’s blog.

Rust HTTP Strict Transport Security Guide: What It Is and How to Enable It

It’s common knowledge that HTTPS URLs are safer than plain HTTP. The “S” confirms some transport layer security TLS, which protects your network from middleman attacks among other threats. Implementing Rust HTTP Strict Transport Security (HSTS) is a step you should keep at the back of your mind as you develop with Rust-Lang. This post explores just what it means when, for instance, you conduct a health scan of your Rust web application and get a “HSTS headers missing” report. Learn more from Taurai Mutimutema on Stackhawk’s blog.

Laravel HTTP Strict Transport Security Guide: What It Is and How to Enable It

Once upon a time, most websites were unencrypted. Website operators limited HTTPS connections to high-value login and payment forms. Today, transport layer security (TLS/SSL) is the default mode for most websites. The internet is a safer place now. As the next evolutionary step, the HTTP strict transport security (HSTS) standard ensures that HTTPS isn’t just possible but that unencrypted HTTP connections become impossible. This article covers configuring HSTS in Laravel applications. Find out more from Lukas Rosenstock on Stackhawk’s blog.

Rails Broken Access Control Guide: Examples and Prevention

Have you ever wondered how it is that systems and platforms handle user access and permission while preventing attackers and bad actors from having access to the server file system and restricted files? Well, that is a great question. Understanding the fundamentals of access control and authorization is a great asset for any developer. For those who work on sensitive applications that require a high level of security, or even the enthusiast who wants to learn a bit more, we’ll be addressing your questions. This article from Juan Reyes can help you explore the subject of access control and how to ensure adequate security for web applications. Check it out on Stackhawk’s blog.

Golang HTTP Strict Transport Security Guide: What It Is and How to Enable It

Golang has so many advantages that lure developers into using it as a preferred back-end programming language. Among the lot is how it’s perfectly suited for creating software in the cloud. The thing is, everything in the cloud requires HTTP for access, and this is where Golang HTTP Strict Transport Security (HSTS) comes into play. This post from Taurai Mutimutema explores the best ways to implement HSTS headers in Go projects. Get the details on Stackhawk’s blog. 

Measure Quality and Coverage: Using SonarQube With JavaScript

We also updated a couple of posts this week, like this one on using SonarQube with JavaScript. Another very important piece on that cog is leveraging tools and techniques that can improve the quality of your code. Linters, for instance, are virtually indispensable if you’re really serious about code quality. Practices such as refactoring are also immensely valuable. In this post, we examine a comprehensive tool that can help you improve your JavaScript code: SonarQube. Check it out on Testim’s blog. 

How to Find an Element by XPath in Selenium

Finally, we updated a post on Selenium. Selenium is one of the most popular tools for testing web applications. One of the most important aspects of using Selenium is how you locate elements to interact with them. You can find elements by their ID, text content, the text of their links, and many more. Today, we’ll cover another important way in which you can locate elements, showing you how to find an element by XPath in Selenium. XPath (XML Path Language) is a World Wide Web Consortium (W3C) standard. It is a query language used for selecting nodes from an XML document. So, what does that have to do with testing webpages? Find out the answer on Testim’s blog.