Why is IT outsourcing profitable and what are its advantages
Guys, has anyone thought about how who chooses a contractor company or a person for a team to perform certain works with their it-infrastructure? So you have your own product, project, or maybe you work in some large company, but one way or another, if…
Research: over 2 million Microsoft web servers are running vulnerable versions of IIS
CyberNews researchers said they have identified over 2 million web servers running on outdated, out-of-service and vulnerable Microsoft Internet Information Services (IIS). Since outdated versions of IIS are no longer supported by Microsoft, the researchers said they could easily compromise them, inject all sorts of…
Update Tuesday: Microsoft has released August security updates
Microsoft released planned security updates covering 44 vulnerabilities (51 vulnerabilities, including closed vulnerabilities in Microsoft Edge browser), 7 of which were classified as critical, 3 were of the zero-day (0-day) vulnerability, and 1 vulnerability was exploited in real attacks. In this article, I will cover…
Optimizing the code using the sort function as an example
A number of algorithms can be distinguished that are basic and underlie almost every line of programs written in high-level languages. It is good to have at hand the classic multivolume work of Donald Knuth “The Art of Computer Programming”, where many basic algorithms are…
DevOps Time for Java Developers
The topic for discussion is building Java applications in CI. Let’s take a look at the Maven repository on Docker Hub. The latest version (3.8.1) appears everywhere, but images based on Alpine are only ibmjava-8, there are no 11 or current releases. The 11-slim image…
Type Safety in JavaScript: Flow and TypeScript
Disclaimer: I do not claim to be a discovery in this article, but only want to help avoid mistakes when creating applications. We all love the “magic” that a tool like SignalR gives us and are happy to implement it in our projects. Of course,…
How hackers spoof DNS requests by poisoning the cache
Domain Name Server (DNS) spoofing is a cyberattack in which an attacker directs the victim’s traffic to a malicious site (instead of a legitimate IP address). Attackers use DNS cache poisoning to intercept Internet traffic and steal credentials or confidential information. DNS cache poisoning and…
Fiddler = convenient sniffer + proxy server
In this article, we will understand how and why you can change HTTP packets when sending to the server and when receiving responses from the server. Why do this? Example 1. Traffic analysis.Your network users are using your proxy server. You can see which sites…
Service
Categories
- DEVELOPMENT (103)
- DEVOPS (53)
- FRAMEWORKS (26)
- IT (25)
- QA (14)
- SECURITY (13)
- SOFTWARE (13)
- UI/UX (6)
- Uncategorized (8)