Scaling Amazon ECS Services for Efficient SQS Queue HandlingThis article serves as a continuation of the initial post authored by Ahmed Azzam and Sebastian Lee titled “Amazon Elastic Container…Feb 41Feb 41
Synchronizer Token Pattern for Cross-Site Request Forgery PreventionWithin the contemporary context in which most of the communication and transactions are taking place over the web, the data being…Feb 21, 2022Feb 21, 2022
Double Submit Cookie for Cross-Site Request Forgery PreventionOne of the extensively used alternatives for Synchronizer Token Pattern, for protection against Cross-Site Request Forgery, is the Double…Feb 21, 2022Feb 21, 2022
What is API security?An Application Programming Interface (API) can be defined as the middle man to a program’s backbone. Modern software is designed as stacks…Feb 21, 2022Feb 21, 2022
How to setup Multi-factor Authentication with OpenVPN Community EditionOverview of the ProcessFeb 21, 2022Feb 21, 2022