Fiddly CookieHow secure and sustainable ADA really is.Cordano functions differently from other cryptocurrencies and tries to tackle long-standing and fundamental problemsApr 19, 2021Apr 19, 2021
Fiddly CookieMy ‘Certified Red Team Professional’ Journey — 2020 CRTP ReviewFrom Zero to ProfessionalSep 21, 20201Sep 21, 20201
Fiddly CookieSolving Procrastination — The Engineer’s WayI discovered a simple trick from a bizarre insight drawn from stats related to my personal behavior. I call it — The Big HackSep 2, 2020Sep 2, 2020
Fiddly CookieHandling threats from plagued ‘White Collar Robots’ — A case-study on RPA securityRobotic Process Automation (RPA) is a new wave of future technologies. Evolving over time, automation started with screen scraping and…Apr 26, 2020Apr 26, 2020
Fiddly CookieThings most cyber-security professionals are not aware ofReal-world data on security incidents and data breaches from Verizon Data Breach Investigations ReportOct 29, 2019Oct 29, 2019
Fiddly CookieIntegrating AWS DynamoDB Document API in Android applicationA lot of developers have been tossing around suggestions on implementing DynamoDB which removes scalability limitations on data storage…Sep 8, 20191Sep 8, 20191
Fiddly CookieinInfoSec Write-upsNoSQL InjectionNoSQL (not only SQL) has disrupted the usage of traditional data stores. It has introduced a new concept of data storage which is…Feb 4, 2019Feb 4, 2019
Fiddly CookieinInfoSec Write-upsWhat is a Second-Order SQL Injection and how can you exploit it successfully?What is SQL InjectionJan 24, 2019Jan 24, 2019