Application SecurityTechnology
The basic principle of CSRF vulnerability Whenever we are accessing an application, the browser is sending a request to the server and the server responds to the request by sending some data to the browser called response. This two-way communication continues as we continue using the application. When we login to the application, the login […]
I have been working on different MTAs since the last couple of years. This time, the Exim4 use-case which I encountered was to sends emails using premium Email Service Provider. Use-case: We were supposed to send thousands of emails like auto-reply emails or newsletters from our dedicated server(Ec2 machines) inside the private subnet. I chose to […]
Every new version of Grails brings some enhancements, and challenges on developer side too. Starting Grails 2.3.x, we had to change our approach to use debugger with our application, and with Grails 3.x coming out, we need to change approach to use debugger again. As Grails now uses Spring Boot and Gradle, we have to […]
Digital AnalyticsIndustry Buzz
SOURCE: Google Search Data July’13 – June’15 1) Do You Know when it comes to Travel, especially Planning and research on Google a) Consumers prefer mobile devices for Awareness & Evaluation of Travel Destinations b) For consideration & final purchase they still prefer Large Screen devices like Desktops & Laptops For more interesting insights regarding […]
Bug Reporting Bug Reporting is the activity of posting a bug to the development team to fix it. Bug reporting in independent software testing can be done using a simple spread sheet or using a bug tracking tool. While reporting a bug don’t forget to fill up following fields – Bug ID (Auto generated in […]
App thinning is a concept for modern day interactive apps where there are a lot of resources. The App Store and OS install the app according to the device, with a minimal footprint. This helps in making the app which occupies less space, are easy to download and make use of all features. Faster downloads […]
It was indeed an amazing GR8Conf IN 2016 with more than 200 participants, marvelous line-up of speakers and fully packed parallel sessions at The Lalit, New Delhi. This year the conference was sponsored by OCI, which is the new home for Grails. The entire conference was also live streamed by #fame with more than 4000 […]
Introduction : The Apache Cassandra database is the right choice when you need scalability and high availability without compromising performance. Not having to distinguish between a Master and a Slave node allows you to add any number of machines to any cluster in any datacenter, without having to worry about what type of machine you need […]
This Blog explains how to retrieve a specific user’s playlists of videos. This does not require any user authorization. YouTube is widely used in our life. Because simplicity and ease of use, YouTube has become the most popular video sharing and one of the most popular websites in the world. Some YouTube API allows us […]
Application SecurityTechnology
TO THE NEW has been organizing conferences and actively participating in various conferences as well. I was invited to attend a presentation at SANS Community Night in Delhi, India on 14th Jan 2016. The topic of the talk was “DIY vulnerability discovery with DLL Side Loading“, and it’s use as stealthy persistence technique for malware […]
With just less than 24 hours left for the India’s biggest Grails Conference GR8ConfIN 2016, the excitement no doubt is soaring high. GR8ConfIN is dedicated to the technologies in the Groovy ecosystem. We have already got overwhemling response from the audience this year. The gathering is expected to be mostly of developers from groovy and […]
Mobile testing is a very hot topic nowadays. There are two ways to test how the application is interacting with the user on the mobile device one is manually and the other is through automation. Manual testing takes lot of time and it’s a very slow process. While automation testing is more efficient and effective […]