Published inHackerSpotLinux Capabilities for Enhancing SecurityLinux Capabilities are a fundamental security feature that allows for granular control over what processes can and cannot do within a Linux…Nov 8, 20241Nov 8, 20241
Secret Management on Secure Application DevelopmentApplications are becoming more complex and interconnected every day, so it’s important to securely manage secrets like API keys, database…Oct 18, 2024Oct 18, 2024
The Story of MinecraftMinecraft is not just a game; it’s a global phenomenon that has transformed how we think about creativity, exploration, and even education…Aug 26, 2024Aug 26, 2024
Published inHackerSpotUnderstanding Server-Side Template Injection (SSTI)One of the less commonly discussed vulnerabilities is Server-Side Template Injection (SSTI). SSTI is an attack vector that can lead to…Jun 21, 2024Jun 21, 2024
Published inHackerSpotTop LeetCode Challenges to Ace Your Information Security InterviewsIn this post, I want to share a curated list of essential questions for those preparing for information security (infosec) roles in the…Jun 9, 2024Jun 9, 2024
Creating Custom Docker Base Images: Boost Security and EfficiencyIn the modern software development landscape, containerization has emerged as a key element in deploying applications consistently and…Apr 7, 2023Apr 7, 2023
Docker Daemon Startup Issues on ARM-based MacsDocker has become an essential tool for developers, providing a convenient way to containerize and manage applications. However, as with…Mar 29, 2023Mar 29, 2023
Define A Custom Search Shortcut in Google ChromeIn this post, I want to share a simple trick that you can do a search on your custom platform such as Medium, confluence, WordPress, etc.Nov 14, 2022Nov 14, 2022
Win32 System ProgrammingThis note was created in the “Windows System Programming” course that was given by “C and System programmers Accosiaion” in 2016. Kaan…Aug 28, 2022Aug 28, 2022