Fiddly CookieHow secure and sustainable ADA really is.Cordano functions differently from other cryptocurrencies and tries to tackle long-standing and fundamental problems5 min read·Apr 19, 2021----
Fiddly CookieMy ‘Certified Red Team Professional’ Journey — 2020 CRTP ReviewFrom Zero to Professional5 min read·Sep 21, 2020--1--1
Fiddly CookieSolving Procrastination — The Engineer’s WayI discovered a simple trick from a bizarre insight drawn from stats related to my personal behavior. I call it — The Big Hack8 min read·Sep 2, 2020----
Fiddly CookieHandling threats from plagued ‘White Collar Robots’ — A case-study on RPA securityRobotic Process Automation (RPA) is a new wave of future technologies. Evolving over time, automation started with screen scraping and…6 min read·Apr 26, 2020----
Fiddly CookieThings most cyber-security professionals are not aware ofReal-world data on security incidents and data breaches from Verizon Data Breach Investigations Report5 min read·Oct 29, 2019----
Fiddly CookieIntegrating AWS DynamoDB Document API in Android applicationA lot of developers have been tossing around suggestions on implementing DynamoDB which removes scalability limitations on data storage…6 min read·Sep 8, 2019----
Fiddly CookieinInfoSec Write-upsNoSQL InjectionNoSQL (not only SQL) has disrupted the usage of traditional data stores. It has introduced a new concept of data storage which is…6 min read·Feb 4, 2019----
Fiddly CookieinInfoSec Write-upsWhat is a Second-Order SQL Injection and how can you exploit it successfully?What is SQL Injection7 min read·Jan 24, 2019----