Latest Articles
Hoisting in JavaScript
In Javascript programming language declarations are hoisted. Now what do I mean by hoisting ? Is it like hoisting a flag…Yes, definitely like hoisting a flag. Just as a flag when hoisted rises up the pole, declarations in Javascript rise up the top.
All You Need to Know About Service Transition
Transition- It is the process of changing, or a change from one form or condition to another. If someone transitions, they make changes, which may be social, legal, technical or medical, that lead to them living as a person with a different persona to the one they were said to have at birth.
Cluster Upgrade
A cluster consists of one master machine and several worker machines or nodes. Nodes are basically VMs that contain a suitable environment for services to run in it. Since the concept of containerization has widened up a lot in recent years, we can deploy multiple applications inside the same or different nodes using docker containers in the form of pods. The master coordinates between all the nodes.
Threat Analysis
The process of analyzing the cyber operations and capabilities of unknown intelligence institutions or criminals is known as cyber threat analysis. A cybersecurity threat, also known as a “cyber threat,” is a malicious act that attempts to disrupt digital life. This act may include the interruption of a communication channel, data destruction, or data theft.
What is IDOR and how to exploit it?
IDOR Stands for Insecure Direct Object Reference and it is a type Of Access Control Vulnerability. According to OWASP IDOR occurs when a program allows direct access to objects based on user data, this is known as an unreliable direct object reference. As a result of this flaw, attackers can circumvent authorization and gain direct access to device resources, such as database records and files.