What is Penetration Testing?

23 March 2019 by Shaqjohari General

Written by

What is Penetration Testing? Penetration testing is a type of security testing that is used to test the insecurity of an application. It is conducted to find the security risk which might be present in the system. If a system is not secured, then any attacker can disrupt or take authorized access to that system. Security risk is normally an accidental error that occurs while developing and implementing the software. For example, configuration errors, design errors, and software bugs, etc. Why is Penetration Testing Required? Penetration testing normally evaluates a system’s ability to protect its networks, applications, endpoints and users…
Read more...

The top ten password-cracking techniques used by hackers Think your passwords are secure? Think again

27 January 2019 by Shaqjohari General

Written by

Understanding the password-cracking techniques hackers use to blow your online accounts wide open is a great way to ensure it never happens to you.You certainly will always need to change your password, and sometimes more urgently than you think, but mitigating against theft is a great way to stay on top of your account security. You can always head to www.haveibeenpwned.com to check if you're at risk but simply thinking your password is secure enough to not be hacked into, is a bad mindset to have.So, to help you understand just how hackers get your passwords – secure or otherwise…
Read more...

Ruby and PHP: which is the best fit for your startup?

04 November 2018 by Shaqjohari General

Written by

So, you want to start a new project from scratch, and you’re looking for the best web development platform. When it comes to web programming languages, it’s not that easy to make a choice which complies with your requirements. In the following article, we're going to compare Ruby vs. PHP in 2018 and find the main pros and cons of critical aspects of both technologies. The latest versions of languages are Ruby 2.5 and PHP 7.2. All statistics shown below is relevant for June 2018. Both languages are more than 20 years old, mature and proven in production. A lot…
Read more...

My thoughts on IBM buying Red Hat for $34 billion

29 October 2018 by Shaqjohari General

Written by

IBM buying Red Hat should be great for Open Source, good for IBM and healthy for the cloud wars. It was just announced that IBM bought Red Hat for $34 billion in cash. Wow! I remember taking the bus to the local bookstore to buy the Red Hat Linux 5.2 CD-ROMs. It must have been 1998. Ten years later, Red Hat acted as an inspiration for starting my own Open Source business.
Read more...

Technology

27 October 2018 by Shaqjohari General

Written by

Definition of Technology What Is Technology? Technology is a body of knowledge devoted to creating tools, processing actions and the extracting of materials. The term ‘Technology” is wide, and everyone has their way of understanding its meaning. We use technology to accomplish various tasks in our daily lives, in brief; we can describe technology as products and processes used to simplify our daily lives. We use technology to extend our abilities, making people the most crucial part of any technological system.
Read more...

A breakout year for Open Source businesses

27 October 2018 by Shaqjohari General

Written by

  The FUD around Open Source companies is officially over. I was talking to Chetan Puttagunta yesterday, and we both agreed that 2018 has been an incredible year for Open Source businesses so far. (Chetan helped lead NEA's investment in Acquia, but is also an investor in Mulesoft, MongoDB and Elastic.)
Read more...

Web Application Security

27 October 2018 by Shaqjohari General

Written by

Definition – What does Web Application Security mean? Web application security is the process of securing confidential data stored online from unauthorized access and modification. This is accomplished by enforcing stringent policy measures. Security threats can compromise the data stored by an organization is hackers with malicious intentions try to gain access to sensitive information.
Read more...