Cryptography and itsTypes

What is Cryptography and Its Types?

In this modern world, Communication by means of data transmission is playing a vital role. So, how we are making this data transmission more secure? Here comes cryptography. Crypt – ‘hidden’ Graphy – ‘writing’. In layman language, hiding information from the outside world and let only the right receiver know how to see it. In […]

What is Cryptography and Its Types? Read More »

Upgrading Jenkins

Upgrading Jenkins and Post Upgrade Activities

As we know Jenkins is one of the most used opensource automation tools. Since it is highly reliable and stable, it is highly recommended for enterprise CICD and another automation purpose. Although it is highly reliable and stable, we need to be careful when we upgrade Jenkins to new versions of Jenkins. Especially, when we

Upgrading Jenkins and Post Upgrade Activities Read More »

Top Content Management System

Top Content Management System (CMS) Platforms.

The Content Management System is the platform to Create, Update, Delete and Manage the Web contents and digital contents. Mostly, Content Management Systems are used for Enterprise Content Management (ECM) and Web Content Management (WCM) where ECM is can be used for Document management, Digital asset management and more. While, WCM is used for Website

Top Content Management System (CMS) Platforms. Read More »

What is Event-Driven Programming.

What is Event-Driven Programming?

The Event-Driven Programming is an Architectural design pattern to build the software application where components of the runtime open event and responds to the event. In this article, we will discuss the traditional Programming and Event-Driven Programming with detailed comparison and examples to understand. Traditional Programming Let’s see how HTTP 1.0 to understand how events

What is Event-Driven Programming? Read More »

Security Testing with OWASP ZAP Proxy

OWASP ZAP – Zad Attack Proxy and its Features

OWASP ZAP (Zad Attack Proxy) is an opensource Dynamic Application Security Testing (DAST) tool. This will be sitting between web application and end-user and help to identify security vulnerabilities in web application design and architecture. As the name goes, this is Open Web Application Security Project (OWASP) projects. ZAP is one of the successful proxy

OWASP ZAP – Zad Attack Proxy and its Features Read More »

Approaches to Automate Security Testing in CICD Pipelines

Approaches to Automate Security Testing in CICD Pipelines

As part of the current Software application development approach, Security is one of the concerns we should take as serious. The Internet is growing with threats. We must secure our application from those threats in all the possible ways. If we have some structured approach like DevOps for Software development, it will be easy to

Approaches to Automate Security Testing in CICD Pipelines Read More »

Free Domain Names

Free Domain Names – Top 10 Free Domain Name Services.

Looking for Free Domain Names? You are in the right place. If you are planning to start a website? Showcase your company? Promote your Business with a website? You need the Domain name and Hosting space. We have discussed getting Top 10 Hosting Services with Offers. In this article, we will discuss Getting absolutely Free

Free Domain Names – Top 10 Free Domain Name Services. Read More »