Useful tips for everyday
How do I edit host file redirect? How to edit the Windows hosts file to block or redirect websites Click on Start and type in…
What is system call table? System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it…
How do you overwrite a symbolic link? If you try to create a symbolic link that already exists , the ln command will print an…
Does S3 support CORS? Cross-origin resource sharing (CORS) defines a way for client web applications that are loaded in one domain to interact with resources…
How to implement OAuth2 social login with Facebook? For example, if sign in and/or sign up with Facebook functionality needs to be implemented, the developer…
Can the Origin header be spoofed? The header is sent with Cross-Origin Resource Sharing requests along with POST requests. An origin header doesn’t disclose the…
Is it safe to keep passwords in a text file? Yes, definitely. You should never write your passwords on any paper, or store in any…
What protocol does JWT use? JWT relies on other JSON-based standards: JSON Web Signature and JSON Web Encryption. How do I authenticate a user on…
How buffer overflow attack can be prevented? A buffer overflow is one of the best known forms of software security vulnerability and is still a…
How are filters used to prevent SQL injection? In some situations, an application that is vulnerable to SQL injection (SQLi) may implement various input filters…