Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-71)Requesting Only What You Need: HTTP Range Requests2d ago2d ago
Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-70)Cookie Prefixes: Protecting Your Cookies2d ago2d ago
Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-69)Cookies: Small Files, Big Impact5d ago5d ago
Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-68)The Accept Header: Client’s Media Preferences5d ago5d ago
Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-67)Content Negotiation: Tailoring Web Content to Users5d ago5d ago
Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-66)Compression: Speeding Up the WebAug 3Aug 3
Mehedi Hasan RafidBounty Hunting — Complete Guide (Part-65)Reload and Force Reload: Client-Side ValidationAug 2Aug 2
Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-64)Expires vs. Max-Age: A Comparative AnalysisAug 2Aug 2
Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-63)Speeding Up the Web: The Power of HTTP CachingAug 2Aug 2
Mehedi Hasan RafidBug Bounty Hunting — Complete Guide (Part-62)HTTP Authentication: A Basic OverviewJul 31Jul 31