How to Delete Files and Directories in Linux
In the Linux operating system, everything is considered a file, even directories. This guide aims to provide an easy-to-understand walkthrough on how to delete files and directories in Linux. We’ll cover essential commands like rm
and rmdir
along with their options for various scenarios.
Read more
Read moreHow to Read a CSV File in Bash
There are primarily two methods to read a CSV file in Bash: using awk
and using a while
loop with the Internal Field Separator (IFS
). This tutorial will not only cover these methods but also show you how to read a specific column from a CSV file.
Read more
Read moreUnderstanding git pull and How It Differs from git fetch
In this blog post, we’ll talk about two common Git commands: git pull
and git fetch
. They might look like they do the same thing, but they’re actually different. We’ll explain what each command does and highlight their main differences.
Read more
Read moreUnderstanding the Fundamental Concepts of Authentication
Authentication stands as one of the pillars of information security, playing a vital role in ensuring only legitimate users gain system access. Whether you’re logging into your email, accessing your bank account, or just browsing the web, authentication plays a pivotal role in ensuring that your data remains protected and that services are accessed by legitimate users. In this article, we will cover the basics of authentication.
Read more
Read moreHow to Discard Your Local Changes in Git: An Illustrated Guide
As developers, we’ve all encountered situations where we make changes to our code, only to realize later that those changes were unnecessary or need to be discarded. Git, the powerful version control system, provides a straightforward way to undo or discard local changes and revert to the last committed state. In this blog post, we’ll walk you through the process of discarding local changes in Git using practical examples.
Read more
Read moreKey Elements for Developing an Effective API Security Testing Strategy
APIs (Application Programming Interfaces) have become the backbone of modern software development, enabling seamless communication and integration between different systems. However, with the increased reliance on APIs, ensuring their security has become paramount.
Read more
Read moreHow to Amend a Git Commit Message
To amend or undo the previous Git commit message, you can use the git commit --amend
command. Here’s how you can do it:
Read more
Read moreBuilding Resilient Web Applications: The Importance of Web Resilience Testing
In today’s digital age, web applications play a crucial role in our lives. From online banking to e-commerce platforms and social media networks, web applications have become an integral part of how we interact with the digital world. With increasing dependence on web applications, it is essential to ensure their resilience to handle unexpected events and maintain continuous service availability. This is where web resilience testing comes into play.
Read more
Read moreHow to Use the Linux find Command to Find Files
In this post we will look at the linux find
command and how to search and find files with different attributes.
Read more
Read moreBash Arrays With Examples
An array is a collection of elements. In Bash, an array can contain a mix of elements of different types, e.g. Strings and Numbers.
Read more
Read moreHow to Create and Call Functions in Bash
A quick guide on how to create and call functions in Bash.
Read more
Read moreBroken Object Level Authorization With Examples
In this post we explore and discuss Broken Object Level Authorization failure.
Read more
Read moreBash If-Else Statement With Examples
If-else statements in bash scripting is similar to any other programming languages; it is a method for a program to make decisions.
Read more
Read moreBash Script - How to Read User Input
The linux read command is used to take a user input from the command line. This is useful when we want to provide user interactivity at runtime.
Read more
Read moreBash Script - Hello World Example
In this tutorial, we learn how to create and run a simple Bash script which prints out “Hello World”.
Read more
Read moreBash For Loop and While Loop Examples
Like any other scripting language, Bash also has support for loops.
Read more
Read moreHow to Manage Multiple GitHub Accounts on the Same Machine
As developers we normally have to juggle around multiple GitHub accounts on the same machine. For example we have our own personal GitHub account for our own project and then another GitHub account that we use for our client project.
Read more
Read moreDocker for Beginners: What is Docker and How to Create Docker Containers
Learn fundamentals of DevOps. In this tutorial series we cover the essentials and ways of working in a DevOps culture, CI/CD as well as tools used in DevOps and the Cloud.
Read more
Read moreAn Overview of Identity and Access Management (IAM) and Identity Provider (IdP)
Identity and Access Management is the security discipline that enables the right individuals to access the right resources at the right time for the right reasons.
Read more
Read moreDevOps Foundations and Concepts
Learn fundamentals of DevOps. In this tutorial series we cover the essentials and ways of working in a DevOps culture, CI/CD as well as tools used in DevOps and the Cloud.
Read more
Read moreWhat Are Scrum Ceremonies In Agile?
Scrum has four main ceremonies that bring structure to each sprint:
Read more
Read moreCEH v10 - Post Exam Study Write Up
I recently took the CEH v10 exam and passed. In this post, I summarize my experience in pursuing the path to becoming a Certified Ethical Hacker.
Read more
Read moreWeb Application Hacking Methodologies
Web applications are programs that allow users to interact with web servers. They are run on web browsers with the help of client- and server-side scripts.
Read more
Read moreHacking Web Servers - An Overview
Web server is a system used for storing, processing, and delivering websites. It is designed to host web applications, allowing clients to access those applications.
Read more
Read moreCryptography Fundamentals
Cryptography refers to the process of hiding information by converting the readable text into unreadable text using some sort of a key or encryption algorithm.
Read more
Read moreSecurity Threats and Attack Vectors
In this post we will learn about why cyber attacks happen, what are hackers’ motives, classifications of threats and the different attack vectors.
Read more
Read moreInformation Security Overview
Information security refers to a set of processes and activities performed in order to protect information. The main objective of information security is to prevent unauthorized users from stealing and misusing information or services.
Read more
Read moreLinux ls Command - List Files
The ls
command lists the contents of a specified directory. In this post we explain all the options available for the ls
command.
Read more
Read moreNetwork Scanning Techniques
Network scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected information in the footprinting phase.
Read more
Read moreFootprinting and Reconnaissance
Footprinting refers to the process of gathering information about a target system. It is the first step of an attack in which the attacker tries to learn as much as possible about the target to find a way to break into the system.
Read more
Read moreNetwork Protocol Basics and Terminologies
This post gives an overview of network protocols and covers some common network protocol terminologies with examples.
Read more
Read moreHow to Install Git on Mac and Generate SSH Keys
In this step-by-step Git Tutorial, we will go through how to install Git on a Mac machine, how to generate SSH keys and upload your public SSH key to your GitHub account for authorization.
Read more
Read moreWhat are Different Types of Hackers?
What are the different types of hackers? Despite the popular belief, not all hackers are bad. There are several types of hackers, and in this post we will go through them.
Read more
Read moreHow to Transfer Files in Linux with SCP and Rsync
In this tutorial we will explain how to use SCP (Secure Copy) and Rsync, two commands that can be used to transfer files between two machines.
Read more
Read moreEthical Hacking Fundamentals
This blog post is an introduction to Penetration Testing and Ethical Hacking. We’ll cover the basics of Pen testing and explain why penetration testing is important to organizations.
Read more
Read moreConfidentiality, Integrity and Availability
Confidentiality, integrity, and availability, often known as the CIA triad, are the building blocks of information security. This post explains each term with examples.
Read more
Read moreGit Commands Every Tester Should Know
This post is a Git Cheat Sheet with the most common Git commands you will likely use on a daily basis.
Read more
Read more10 Traits of an Agile Self Organizing Team
One of the key important aspects of a successful Agile setup is having a self-organizing team. This is also mentioned in the Agile manifesto:
Read more
Read moreHow to Write Good Agile User Stories
One of the first steps in delivering a quality product, is writing good user stories. In this post, we describe how to write good user stories and what should be included.
Read more
Read moreRoles and Responsibilities of a Product Owner in Agile
Product Owner is one of the main roles in Agile projects. But what does a Product Owner do?
Read more
Read moreAgile Test Plan - Do We Really Need One?
Do we need an Agile Test Plan Document?
Read more
Read moreBDD Guidelines and Best Practices
BDD (Behaviour Driven Development) is a methodology for developing software through continuous example-based communication between developers, QAs and BAs. In this article we discuss some BDD Best Practices to get the most benefit.
Read more
Read more12 Qualities of a Good Agile Leader
How do you spot a good Agile leader?
Read more
Read more