I’m not sure if I would recommend this book to anyone.

It was a bit too much for me, but it might be just right for someone else https://t.co/0pGxW14WfK ...

Continue Reading
I’m not sure what to make of this.

It could be a coincidence, or it could be that the “novelty” and “diversity” factors are actually more important than we thought https://t.co/vJKgiWGl5e ...

Continue Reading
If you don’t have a logging and monitoring system in place, attackers can take advantage of your lack of insight into the malicious activities happening on your network

If you don’t have a logging and monitoring system in place, attackers can take advantage of your lack of insight into the malicious activities happening on your network https://t.co/2rTCe213cC ...

Continue Reading
I’m a newbie, I want to learn how to use the terminal.

What are some good resources https://t.co/fqALk9mws2 ...

Continue Reading
I’m not sure if I like this book or not.

It was a good story, but it wasn’t great https://t.co/la4SqJmYUu ...

Continue Reading
Don’t use the “report” feature on Twitter.

It's broken, and it won't help you anyway https://t.co/BVm0IhgE03 ...

Continue Reading
I’m a software engineer at Google.

I work on the Chrome team, and my main focus is making web apps run faster. I also write about programming on this blog. I graduated from UC Berkeley in 2013 with a degree in Computer Science and Mat ...

Continue Reading
Identify the API’s entry points, which are the locations where an attacker can access the application.

These include: 1. The client-side of a web application (such as JavaScript) that interacts with an API via HTTP requests and responses; 2. A mobile app that communicates with an API using HTTPS; 3. A ...

Continue Reading

Back to Main

Subscribe for the latest news: