How your file uploads may get hacked?
Covering the most important file input validation techniques on the web, some attacks againts them, and highlight the importance of sanitizing data sent by the end user with a case study.
Covering the most important file input validation techniques on the web, some attacks againts them, and highlight the importance of sanitizing data sent by the end user with a case study.
Why this new Log4j vulnerability is so dangerous? Hacked step by step until remote shell.
What is an 1on1 meeting good for, and how to make it really great, where you can connect to your team member in many ways?
Covering a couple benefits of using feature flags in development from business and technical point of view as well.
Fairy techtale from bank operation point of view, where governmental organization is unavailable, they failed changing api, and still able to charge horrible fee.
After clicking on something, it becomes something else. Schrödinger is awake.
Very little, but useful trick to avoid hostfile editing all the time.
How does it work? Is it possible to transfer money, where we don't want to, bcause of a mistake or typo?