Thomas Hunter IIinintrinsicWhy should I use a Reverse Proxy if Node.js is Production-Ready?There are several reasons why one should not directly expose a Node.js process to the web and should instead hide it behind a reverse proxy.9 min read·Mar 28, 2019--21--21
Thomas Hunter IIinintrinsicJavaScript Symbols: But Why?Symbols, the newest JavaScript primitive, bring a few benefits to the language and are particularly useful when used as object properties.9 min read·Mar 5, 2019--20--20
Thomas Hunter IIinintrinsicIntroducing Package Diff (for npm)Package Diff is a tool for displaying visual diffs between published releases of an npm package. GitHub cannot reliably display such a…3 min read·Feb 26, 2019--7--7
Thomas Hunter IIinintrinsicProtecting your JavaScript APIsA cat-and-mouse narrative for securing a browser-based API.7 min read·Jan 31, 2019--1--1
Thomas Hunter IIinintrinsicCompromised npm Package: event-streamOwnership of a popular npm package, event-stream, was transferred by the original author to a malicious user.5 min read·Nov 27, 2018--5--5
Thomas Hunter IIinintrinsicSecuring Node.js Applications with IntrinsicLet’s look at how to secure a Node.js application using Intrinsic.6 min read·Oct 1, 2018----
Thomas Hunter IIinintrinsicJavaScript Object Type CoercionA look at the optional, user-definable methods which will be called when performing various actions upon JavaScript objects.5 min read·Aug 28, 2018--7--7
Thomas Hunter IIinintrinsicJavaScript Object Property Descriptors, Proxies, and Preventing ExtensionAn overview of advanced JavaScript Object features such as Property Descriptors, Proxies, and Preventing Extension.17 min read·Aug 16, 2018--2--2
Thomas Hunter IIinintrinsicCommon Node.js Attack Vectors: SQL InjectionSQL Injections occur when improperly escaped strings are concatenated to generate SQL queries.3 min read·Jun 29, 2018--1--1
Thomas Hunter IIinintrinsicProtecting Node.js Applications from Zip SlipZip Slip is a recently coined phrase for a variant of the classical Path Traversal attack. In order to exploit this attack, one creates a…3 min read·Jun 12, 2018----