Nipun ThathsaraSecure Coding | Vulnerability | Cross Site Scripting (XSS)Detect, exploit and mitigate XSSJun 28, 2022Jun 28, 2022
Nipun ThathsaraSecure Coding | Cross-Origin Resource Sharing (CORS)Same-Origin policy, CORS, Browser and the ServerJun 22, 2022Jun 22, 2022
Nipun ThathsaraSecure Coding | Vulnerability | SQL InjectionSpot, Exploit and Fix SQL InjectionsJun 20, 2022Jun 20, 2022
Nipun ThathsaraOrganisation Management | Part 2 | Database DesignDatabase design of the organisation metadata and authorisation information storageSep 19, 2021Sep 19, 2021
Nipun ThathsaraOrganisation Management | Part 1 | IntroductionOrganisation Management — WSO2 Identity ServerSep 18, 2021Sep 18, 2021
Nipun ThathsaraIdentity Hub’s role in Social LoginsMost, if not all, widely used websites and mobile applications require authentication of its users. Or maybe the anonymous users are not…Apr 26, 2020Apr 26, 2020
Nipun ThathsaraCryptographic HashingA hash function is any function that can be used to map data of arbitrary size to fixed-size values.Apr 18, 2020Apr 18, 2020
Nipun ThathsaraJava Class Loading…Loading is the process of finding the binary representation of a class or interface type with a particular name and creating a class or…Apr 15, 2020Apr 15, 2020
Nipun ThathsaraPublic key Encryption and AuthenticationTwo scenarios below are explained in terms of public key cryptography. Most steps are omitted here for simplicity.Aug 6, 2017Aug 6, 2017