Munsif MusthafaCircuit Breakers: the What and the Why?Imagine there’s a huge line at the gas station ⛽. The attendant takes a few minutes per vehicle to pump fuel and there are only a handful…Jun 29, 2022Jun 29, 2022
Munsif MusthafaIf you are travelling from Sri Lanka…This is going to be a narration of why and how I travelled from Sri Lanka during inflation.Jun 16, 20221Jun 16, 20221
Munsif MusthafaEmbark to Understand — Life Cycle of a BusinessMost things in the world have a cycle of life that is inevitable. Similarly, industries also go through a life cycle of their own…Nov 22, 20211Nov 22, 20211
Munsif MusthafaEmbark to Understand — Strategy of a CompanyAs a software engineer who works for a corporate organization, it has always piqued my curiosity to know how companies that are really…Oct 26, 20211Oct 26, 20211
Munsif MusthafainBetter ProgrammingContainers in the CloudThe concept of containerization, when to use containers, and one of the most popular container servicesAug 31, 2019Aug 31, 2019
Munsif MusthafaBuilding a File Upload Service to your Google Drive using OAuth 2.0This blog post will steer you through the technicalities of OAuth 2.0 and how to make use of the resource sharing capabilities.Oct 16, 2018Oct 16, 2018
Munsif MusthafaCSRF Protection Episode 2. Double Submit Cookie PatternIn my previous blog post, I had discussed about the Synchronizer Token Pattern (STP) and how it is implemented. This post is about the…Oct 8, 2018Oct 8, 2018
Munsif MusthafaCSRF Protection Episode 1. Synchronizer Token PatternSynchronizer Token PatternOct 7, 2018Oct 7, 2018
Munsif MusthafaHow users are tricked into Cross-site Request ForgeryIntroduction to CSRF attacks and the mitigationsOct 7, 20181Oct 7, 20181
Munsif MusthafaThreats to Information Security and What the Hash you could do about it?What are Hash Functions?Aug 28, 2018Aug 28, 2018