5 followers
| Technologist | Cyber Security & Open-Source Enthusiast | Tech Blogger | Write-up and Views are My personal Opinion and Experiences😊 |
This blog is a good read if you are still poking in to your mobile to read some interesting and relatable Tech stories. Here I share my Experience...
Once upon a time in the software industry, Big companies looked for reliable partners (aka vendors) to manage their services. Meanwhile, these vendors...
Content is of my Own not from an AI Machine 😜 · Over the years, our focus has been on enhancing our software's functionality and striving for vendor...
Introduction In the realm of web security, Cross-Site Scripting (XSS) stands as one of the most prevalent and hazardous vulnerabilities. With its...
When deciding on an open-source tool for a specific purpose, there are several key parameters you should consider to ensure the tool meets your needs...
Path expressions are used in a variety of software applications to construct file paths. However, if these expressions are not properly validated,...