Why is IT outsourcing profitable and what are its advantages
Guys, has anyone thought about how who chooses a contractor company or a person for a team to perform certain works with their it-infrastructure? So you have your own product, project, or maybe you work in some large company, but one way or another, if…
Research: over 2 million Microsoft web servers are running vulnerable versions of IIS
CyberNews researchers said they have identified over 2 million web servers running on outdated, out-of-service and vulnerable Microsoft Internet Information Services (IIS). Since outdated versions of IIS are no longer supported by Microsoft, the researchers said they could easily compromise them, inject all sorts of…
Update Tuesday: Microsoft has released August security updates
Microsoft released planned security updates covering 44 vulnerabilities (51 vulnerabilities, including closed vulnerabilities in Microsoft Edge browser), 7 of which were classified as critical, 3 were of the zero-day (0-day) vulnerability, and 1 vulnerability was exploited in real attacks. In this article, I will cover…
DevOps Time for Java Developers
The topic for discussion is building Java applications in CI. Let’s take a look at the Maven repository on Docker Hub. The latest version (3.8.1) appears everywhere, but images based on Alpine are only ibmjava-8, there are no 11 or current releases. The 11-slim image…
Type Safety in JavaScript: Flow and TypeScript
Both engines for JavaScript-type support have roughly the same capabilities. However, if you come from strongly typed languages, even typed JavaScript has a very important difference from Java: all types essentially describe interfaces, that is, a list of properties (and their types and/or arguments). And…
How hackers spoof DNS requests by poisoning the cache
Domain Name Server (DNS) spoofing is a cyberattack in which an attacker directs the victim’s traffic to a malicious site (instead of a legitimate IP address). Attackers use DNS cache poisoning to intercept Internet traffic and steal credentials or confidential information. DNS cache poisoning and…
Fiddler = convenient sniffer + proxy server
In this article, we will understand how and why you can change HTTP packets when sending to the server and when receiving responses from the server. Why do this? Example 1. Traffic analysis.Your network users are using your proxy server. You can see which sites…
How Serverless Computing (Function-as-a-Service) works and where it is used
Serverless computing and the Function-as-a-Service solutions that work on their basis help developers develop products with a focus on business features. We experimented with these technologies and came to the conclusion that the existing solutions are damp for combat use. Let’s go in order. The…
Service
Categories
- DEVELOPMENT (93)
- DEVOPS (44)
- FRAMEWORKS (18)
- IT (22)
- QA (14)
- SECURITY (13)
- SOFTWARE (12)
- UI/UX (6)
- Uncategorized (7)