Sparsh OltikarMy learnings on Part I of Smashing UX Design: Foundations for Designing Online User ExperiencesPart I of the book by James and Jesmond tells us about their UX projects and the processes they followed through their experience at…Feb 241
Arbaaz JamadarJWTWhat is JWT: JWT is a JSON WEB TOKEN, JSON in JWT text-based format for transmitting data across web applications. It can be used as a…Feb 19, 2022
Arbaaz JamadarSSRFServer-side request forgery (SSRF), lets an attacker send crafted requests from the back-end server of a vulnerable application. It is…Feb 15, 2022Feb 15, 2022
InAnalytics VidhyabyMrinal RoyANOVA and Its Significance in Decision makingBelonging to a middle class in India, I always wondered if different brands of Lubricant will have different effect on mileage of my bike?Jun 20, 2021Jun 20, 2021
Arbaaz JamadarFile Inclusion 👀File inclusion vulnerability allows an attacker to access unauthorized files available on the web server or to execute malicious files on…Feb 9, 2022Feb 9, 2022
Sparsh OltikarMy learnings on Part I of Smashing UX Design: Foundations for Designing Online User ExperiencesPart I of the book by James and Jesmond tells us about their UX projects and the processes they followed through their experience at…Feb 241
Arbaaz JamadarJWTWhat is JWT: JWT is a JSON WEB TOKEN, JSON in JWT text-based format for transmitting data across web applications. It can be used as a…Feb 19, 2022
Arbaaz JamadarSSRFServer-side request forgery (SSRF), lets an attacker send crafted requests from the back-end server of a vulnerable application. It is…Feb 15, 2022
InAnalytics VidhyabyMrinal RoyANOVA and Its Significance in Decision makingBelonging to a middle class in India, I always wondered if different brands of Lubricant will have different effect on mileage of my bike?Jun 20, 2021
Arbaaz JamadarFile Inclusion 👀File inclusion vulnerability allows an attacker to access unauthorized files available on the web server or to execute malicious files on…Feb 9, 2022
Arbaaz JamadarTop intriguing hackers:World’s Top Hackers Introduction: The world is full of people who test their potential in some kind of way. We are going to see how the…Jan 13, 2022
Irum MeharANOVA as an extension of Linear RegressionIn the fields related to the study of data, investigating relationships between variables is the fundamental and key undertaking. To…Feb 23, 2021
InAnalytics VidhyabyNishad SIntroduction to Logistic RegressionHave you ever wondered why some people are extended loans or credit cards by banks while some others are not? How do banks know with some…Feb 16, 2021