How hackers spoof DNS requests by poisoning the cache
Domain Name Server (DNS) spoofing is a cyberattack in which an attacker directs the victim’s traffic to a malicious site (instead of a legitimate IP address). Attackers use DNS cache poisoning to intercept Internet traffic and steal credentials or confidential information. DNS cache poisoning and…
Fiddler = convenient sniffer + proxy server
In this article, we will understand how and why you can change HTTP packets when sending to the server and when receiving responses from the server. Why do this? Example 1. Traffic analysis.Your network users are using your proxy server. You can see which sites…
How Serverless Computing (Function-as-a-Service) works and where it is used
Serverless computing and the Function-as-a-Service solutions that work on their basis help developers develop products with a focus on business features. We experimented with these technologies and came to the conclusion that the existing solutions are damp for combat use. Let’s go in order. The…
Writing unit tests in TypeScript (by the example of cats)
How do I write unit tests in a TypeScript project? In this article, we will try to answer this question and also show you how to create a unit testing environment for projects using TypeScript. What are unit tests? Unit tests – Tests applied across…
A cloud for everyone. Building a CI/CD pipeline for serverless functions
In a public cloud built on Huawei technologies, there is an extremely useful serverless computing service – Function Graph. It allows you to quickly jot down code to solve a specific business problem and run it without wasting time deploying and configuring individual servers. But…
Linux & Desktop – how to live and survive
Many people, when they hear that someone is using Linux as a workstation, ask themselves why and how we do it. If there are many very different options for the first question, then the experience with the second one is quite similar for generalization. How…
Top 8 announcements from Microsoft Inspire 2021
“Microsoft is deeply committed to providing partners around the world with the most innovative technologies, tools and solutions in the industry,” Nick Parker, corporate vice president of global partnerships for Microsoft, said in a blog post. “We are constantly striving to drive business growth and…
KRACK Attack Author Reveals 12 Critical Vulnerabilities Of Popular Wireless Devices
KRACK (Key Reinstallation Attacks) attacks were reported several years ago. The so-called tools that allow you to exploit critical vulnerabilities in the WPA2 protocol, which are considered quite reliable. KRACK allows you to bypass security and listen to traffic in a wireless network at the…
Writing a Basic GitHub Action in TypeScript
Anywhere in the repository. For example, you can place multiple actions in the root of the repository, each in its own subfolder. This method works well if you want to create something like a personal library with a set of actions that you intend to…
C# vs Kotlin
When it comes to sugar and fancy features in programming languages, C# and Kotlin are among the first options in mind. Since these two languages occupy similar niches, that is, they are strongly typed, garbage collected, cross-platform, used both in the backend and in mobile…
Service
Categories
- DEVELOPMENT (103)
- DEVOPS (53)
- FRAMEWORKS (26)
- IT (25)
- QA (14)
- SECURITY (13)
- SOFTWARE (13)
- UI/UX (6)
- Uncategorized (8)