Mayuresh JoshiOWASPeasy: Broken Access ControlThe word OWASP sounds too technical to a layman so I decided to write this blog in order to make the document more easy and accessible to…Mar 11Mar 11
Mayuresh JoshiConversion Rate Optimization in Digital marketingNowadays, the majority of marketing teams concentrate on getting people to visit websites in the hopes that this traffic will turn into…Dec 13, 2022Dec 13, 2022
Mayuresh JoshiFace recognition system security analysis for authenticationFacial technology has drastically improved over time. Nowadays, it can be found in devices ranging from smartphones to cars. After reading…Dec 12, 2022Dec 12, 2022
Mayuresh JoshiCreate a Simple File Encryption System in C++Nowadays, there are increasing number of cyber threats like hacking, MITM attacks etc. Data can easily be leaked and be used for various…Aug 25, 2022Aug 25, 2022
Mayuresh JoshiDiscussing Gödel’s TheoremKurt Gödel, an Austrian logician, achieved possibly one of the most amazing intellectual feats in history in 1931. Mathematicians of the…Jun 1, 20225Jun 1, 20225
Mayuresh JoshiTryHackMe - Kenobi WalkthroughToday, we will be going through the Kenobi room on TryHackMe.Feb 14, 2022Feb 14, 2022
Mayuresh JoshiAugmented Database Management: A Brief OverviewAn efficiently designed database management system is essential for an enterprise aiming to maximize the impact of their analytics…Jan 2, 20226Jan 2, 20226