Fiddler = convenient sniffer + proxy server
In this article, we will understand how and why you can change HTTP packets when sending to the server and when receiving responses from the server. Why do this? Example 1. Traffic analysis.Your network users are using your proxy server. You can see which sites…
How Serverless Computing (Function-as-a-Service) works and where it is used
Serverless computing and the Function-as-a-Service solutions that work on their basis help developers develop products with a focus on business features. We experimented with these technologies and came to the conclusion that the existing solutions are damp for combat use. Let’s go in order. The…
Writing unit tests in TypeScript (by the example of cats)
How do I write unit tests in a TypeScript project? In this article, we will try to answer this question and also show you how to create a unit testing environment for projects using TypeScript. What are unit tests? Unit tests – Tests applied across…
A cloud for everyone. Building a CI/CD pipeline for serverless functions
In a public cloud built on Huawei technologies, there is an extremely useful serverless computing service – Function Graph. It allows you to quickly jot down code to solve a specific business problem and run it without wasting time deploying and configuring individual servers. But…
Linux & Desktop – how to live and survive
Many people, when they hear that someone is using Linux as a workstation, ask themselves why and how we do it. If there are many very different options for the first question, then the experience with the second one is quite similar for generalization. How…
Top 8 announcements from Microsoft Inspire 2021
“Microsoft is deeply committed to providing partners around the world with the most innovative technologies, tools and solutions in the industry,” Nick Parker, corporate vice president of global partnerships for Microsoft, said in a blog post. “We are constantly striving to drive business growth and…
KRACK Attack Author Reveals 12 Critical Vulnerabilities Of Popular Wireless Devices
KRACK (Key Reinstallation Attacks) attacks were reported several years ago. The so-called tools that allow you to exploit critical vulnerabilities in the WPA2 protocol, which are considered quite reliable. KRACK allows you to bypass security and listen to traffic in a wireless network at the…
Writing a Basic GitHub Action in TypeScript
This article is primarily intended for beginners, those who have never used GitHub Actions but would like to get started quickly. Nevertheless, even if you already have a similar experience, but you, for example, have not used ncc, then perhaps you will find something useful…
Service
Categories
- DEVELOPMENT (104)
- DEVOPS (53)
- FRAMEWORKS (27)
- IT (25)
- QA (14)
- SECURITY (14)
- SOFTWARE (13)
- UI/UX (6)
- Uncategorized (8)