furkanozgulWhat is the Directory Traversal ?Directory traversal (also known as path traversal) is a web vulnerability that could allow an attacker to read arbitrary files on the…Aug 31, 2023Aug 31, 2023
furkanozgulScaning Docker Image with TrivyTrivy scanner is a comprehensive and versatile open source tool that looks for vulnerabilities and configuration errors in different…Aug 22, 2023Aug 22, 2023
furkanozgulCAP THEOREMYCAP theorem briefly; He argues that in a distributed (distributed) architecture there cannot be the same and Consistency (Consistency)…Aug 21, 2023Aug 21, 2023
furkanozgulLocust for Load TestingLocust is a load testing tool that sends requests to a web or api written in the Python programming language. Using Locust, you can test…Aug 21, 2023Aug 21, 2023
furkanozgulLoad Balancing Testing with JMeterYou have developed a Rest API and deployed it to an environment. It allows you to pre-measure whether your system crashes when how many…Aug 16, 2023Aug 16, 2023
furkanozgulSQL InjectionAll the information of the websites are in the database of that website. All the attacker has to do is access the database by exploiting a…Aug 15, 2023Aug 15, 2023
furkanozgulCDN (Content Delivery Network)CDN (Content Delivery Network) — greatly improves server response time by delivering fast delivery of your static content (images, CSS…Aug 15, 2023Aug 15, 2023
furkanozgulDocker NetworkEver since the container architecture was reduced to development processes, “Docker” has become an indispensable tool for us developers…Aug 11, 2023Aug 11, 2023
furkanozgulOWASP Zed Atack Proxy (ZAP)Owasp (Open Web Application Security Project) is a non-profit, open source project that works to make WEB more reliable with various tools…Aug 11, 2023Aug 11, 2023