REST stands for Representational State Transfer. It is a set of design principles for making network communication more scalable and flexible. REST definition outlines a number of architectural constraints that a system must satisfy to be considered...
Continue reading »Larapulse Technology articles
It would seem that such a trivial problem as SQL injection is no longer a problem, but unfortunately this vulnerability is still relevant and is in the top of the OWASP Top-10 list. To understand how this problem can be avoided, we first look at why it is so dangerous and what the consequences of it can be.
Continue reading »Let's get back to basics and remind ourselves how it all began and analyze both the strengths and weaknesses of each of them.
Continue reading »Most of us know about good old SOLID principles introduced by Uncle Bob, but do we understand it the right way? And do we use it the right way, or just talking about it? Let's go through step by step to remind ourselves about the core ideas and principles of it.
Continue reading »Whether you agree or you don't, digital security is a foremost concern among both individuals and businesses. To mitigate or avoid cyber attacks, it is crucial that you make a Virtual Private Network (VPN) an essential component of your overall digital security strategy. Identifying which VPN protocol you should use is a good initial step.
Continue reading »Redis is an in-memory key-value data store and a popular choice for caching, session management, gaming, leaderboards, real-time analytics, geospatial, ride-hailing, chat/messaging, media streaming, and pub/sub apps.
Continue reading »JSON Web Token or JWT, is a standard for safely passing claims in space constrained environments. Simplicity, compactness and usability are key features of its architecture.
Continue reading »An application can be developed with an amazing architecture, using the latest technologies and having the best interface, etc. But if it doesn't solve the business's needs, it won't be considered useful for it. That's when domain driven design (DDD) comes in. As its name says, the point here is to focus on the domain of a specific business.
Continue reading »Two of the most common attacks against web sites and web application are XSS (Cross-site Scripting) and CSRF (Cross-Site Request Forgery). Both kind of attacks are exploited regulary and even big companies have been vulnerable to them.
Continue reading »A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application — either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
Continue reading »