It's an IBM ThinkPad X41 Tablet (2nd gen). It runs Linux Mint 17.3 MATE Edition with Cinnamon 2.8 as its desktop environment. The laptop is old, but it still works great! The only problem is that the ...
Continue ReadingSeptember 18, 2021
I have no idea what I'm doing, but that's okay because it's fun! I've been working on an app for about two months now. It started out as just me messing around with some code and seeing if I could ge ...
Continue ReadingSeptember 18, 2021
If you want to keep playing it, go ahead https://t.co/HmlWT1DJVo ...
Continue ReadingSeptember 18, 2021
I've worked on various parts of Google+, including the home stream, notifications, and search. I was born in Stuttgart (Germany) but grew up in San Diego (California). My parents are both computer sc ...
Continue ReadingSeptember 18, 2021
WAFs cant protect APIs, but they try anyway Web Application Firewalls (WAFs) have been around since the early 2000's when OWASP released their first Top 10 list of web application vulnerabilities. ...
Continue ReadingSeptember 18, 2021
APIs Are Not Web Applications Theyre Microservices! The other problem with SAST is that it was designed to be used against monolithic web applications, which have a single entry point (typically ...
Continue ReadingSeptember 18, 2021
API Security Testing is more complex than SAST SAST works by examining the source code of an application to determine where it may be vulnerable to external attack, but this does not take into accoun ...
Continue ReadingSeptember 18, 2021
The typical approach to a web application vulnerability assessment involves scanning the codebase, creating a model and then running this against an automated scanner such as Burp Suite or ZAP. This p ...
Continue ReadingSeptember 17, 2021
Back to Main