operations

How to Delete Files and Directories in Linux

In the Linux operating system, everything is considered a file, even directories. This guide aims to provide an easy-to-understand walkthrough on how to delete files and directories in Linux. We’ll cover essential commands like rm and rmdir along with their options for various scenarios.

Read more

Read more
operations

How to Read a CSV File in Bash

There are primarily two methods to read a CSV file in Bash: using awk and using a while loop with the Internal Field Separator (IFS). This tutorial will not only cover these methods but also show you how to read a specific column from a CSV file.

Read more

Read more
operations

Understanding git pull and How It Differs from git fetch

In this blog post, we’ll talk about two common Git commands: git pull and git fetch. They might look like they do the same thing, but they’re actually different. We’ll explain what each command does and highlight their main differences.

Read more

Read more
operations

Understanding the Fundamental Concepts of Authentication

Authentication stands as one of the pillars of information security, playing a vital role in ensuring only legitimate users gain system access. Whether you’re logging into your email, accessing your bank account, or just browsing the web, authentication plays a pivotal role in ensuring that your data remains protected and that services are accessed by legitimate users. In this article, we will cover the basics of authentication.

Read more

Read more
operations

How to Discard Your Local Changes in Git: An Illustrated Guide

As developers, we’ve all encountered situations where we make changes to our code, only to realize later that those changes were unnecessary or need to be discarded. Git, the powerful version control system, provides a straightforward way to undo or discard local changes and revert to the last committed state. In this blog post, we’ll walk you through the process of discarding local changes in Git using practical examples.

Read more

Read more
operations

Key Elements for Developing an Effective API Security Testing Strategy

APIs (Application Programming Interfaces) have become the backbone of modern software development, enabling seamless communication and integration between different systems. However, with the increased reliance on APIs, ensuring their security has become paramount.

Read more

Read more
operations

How to Amend a Git Commit Message

To amend or undo the previous Git commit message, you can use the git commit --amend command. Here’s how you can do it:

Read more

Read more
operations

Building Resilient Web Applications: The Importance of Web Resilience Testing

In today’s digital age, web applications play a crucial role in our lives. From online banking to e-commerce platforms and social media networks, web applications have become an integral part of how we interact with the digital world. With increasing dependence on web applications, it is essential to ensure their resilience to handle unexpected events and maintain continuous service availability. This is where web resilience testing comes into play.

Read more

Read more
operations

How to Use the Linux find Command to Find Files

In this post we will look at the linux find command and how to search and find files with different attributes.

Read more

Read more
operations

Bash Arrays With Examples

An array is a collection of elements. In Bash, an array can contain a mix of elements of different types, e.g. Strings and Numbers.

Read more

Read more
operations

How to Create and Call Functions in Bash

A quick guide on how to create and call functions in Bash.

Read more

Read more
operations

Broken Object Level Authorization With Examples

In this post we explore and discuss Broken Object Level Authorization failure.

Read more

Read more
operations

Bash If-Else Statement With Examples

If-else statements in bash scripting is similar to any other programming languages; it is a method for a program to make decisions.

Read more

Read more
operations

Bash Script - How to Read User Input

The linux read command is used to take a user input from the command line. This is useful when we want to provide user interactivity at runtime.

Read more

Read more
operations

Bash Script - Hello World Example

In this tutorial, we learn how to create and run a simple Bash script which prints out “Hello World”.

Read more

Read more
operations

Bash For Loop and While Loop Examples

Like any other scripting language, Bash also has support for loops.

Read more

Read more
operations

How to Manage Multiple GitHub Accounts on the Same Machine

As developers we normally have to juggle around multiple GitHub accounts on the same machine. For example we have our own personal GitHub account for our own project and then another GitHub account that we use for our client project.

Read more

Read more
operations

Docker for Beginners: What is Docker and How to Create Docker Containers

Learn fundamentals of DevOps. In this tutorial series we cover the essentials and ways of working in a DevOps culture, CI/CD as well as tools used in DevOps and the Cloud.

Read more

Read more
operations

An Overview of Identity and Access Management (IAM) and Identity Provider (IdP)

Identity and Access Management is the security discipline that enables the right individuals to access the right resources at the right time for the right reasons.

Read more

Read more
operations

DevOps Foundations and Concepts

Learn fundamentals of DevOps. In this tutorial series we cover the essentials and ways of working in a DevOps culture, CI/CD as well as tools used in DevOps and the Cloud.

Read more

Read more
operations

What Are Scrum Ceremonies In Agile?

Scrum has four main ceremonies that bring structure to each sprint:

Read more

Read more
operations

CEH v10 - Post Exam Study Write Up

I recently took the CEH v10 exam and passed. In this post, I summarize my experience in pursuing the path to becoming a Certified Ethical Hacker.

Read more

Read more
operations

Web Application Hacking Methodologies

Web applications are programs that allow users to interact with web servers. They are run on web browsers with the help of client- and server-side scripts.

Read more

Read more
operations

Hacking Web Servers - An Overview

Web server is a system used for storing, processing, and delivering websites. It is designed to host web applications, allowing clients to access those applications.

Read more

Read more
operations

Cryptography Fundamentals

Cryptography refers to the process of hiding information by converting the readable text into unreadable text using some sort of a key or encryption algorithm.

Read more

Read more
operations

Security Threats and Attack Vectors

In this post we will learn about why cyber attacks happen, what are hackers’ motives, classifications of threats and the different attack vectors.

Read more

Read more
operations

Information Security Overview

Information security refers to a set of processes and activities performed in order to protect information. The main objective of information security is to prevent unauthorized users from stealing and misusing information or services.

Read more

Read more
operations

Linux ls Command - List Files

The ls command lists the contents of a specified directory. In this post we explain all the options available for the ls command.

Read more

Read more
operations

Network Scanning Techniques

Network scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected information in the footprinting phase.

Read more

Read more
operations

Footprinting and Reconnaissance

Footprinting refers to the process of gathering information about a target system. It is the first step of an attack in which the attacker tries to learn as much as possible about the target to find a way to break into the system.

Read more

Read more
operations

Network Protocol Basics and Terminologies

This post gives an overview of network protocols and covers some common network protocol terminologies with examples.

Read more

Read more
operations

How to Install Git on Mac and Generate SSH Keys

In this step-by-step Git Tutorial, we will go through how to install Git on a Mac machine, how to generate SSH keys and upload your public SSH key to your GitHub account for authorization.

Read more

Read more
operations

What are Different Types of Hackers?

What are the different types of hackers? Despite the popular belief, not all hackers are bad. There are several types of hackers, and in this post we will go through them.

Read more

Read more
operations

How to Transfer Files in Linux with SCP and Rsync

In this tutorial we will explain how to use SCP (Secure Copy) and Rsync, two commands that can be used to transfer files between two machines.

Read more

Read more

Ethical Hacking Fundamentals

This blog post is an introduction to Penetration Testing and Ethical Hacking. We’ll cover the basics of Pen testing and explain why penetration testing is important to organizations.

Read more

Read more
operations

Confidentiality, Integrity and Availability

Confidentiality, integrity, and availability, often known as the CIA triad, are the building blocks of information security. This post explains each term with examples.

Read more

Read more
operations

Git Commands Every Tester Should Know

This post is a Git Cheat Sheet with the most common Git commands you will likely use on a daily basis.

Read more

Read more
operations

10 Traits of an Agile Self Organizing Team

One of the key important aspects of a successful Agile setup is having a self-organizing team. This is also mentioned in the Agile manifesto:

Read more

Read more
operations

How to Write Good Agile User Stories

One of the first steps in delivering a quality product, is writing good user stories. In this post, we describe how to write good user stories and what should be included.

Read more

Read more
operations

Roles and Responsibilities of a Product Owner in Agile

Product Owner is one of the main roles in Agile projects. But what does a Product Owner do?

Read more

Read more
operations

Agile Test Plan - Do We Really Need One?

Do we need an Agile Test Plan Document?

Read more

Read more
operations

BDD Guidelines and Best Practices

BDD (Behaviour Driven Development) is a methodology for developing software through continuous example-based communication between developers, QAs and BAs. In this article we discuss some BDD Best Practices to get the most benefit.

Read more

Read more
operations

Agile Terminologies and Definitions

Acceptance Testing

Read more

Read more
operations

12 Qualities of a Good Agile Leader

How do you spot a good Agile leader?

Read more

Read more