top of page
Search
The Tech Platform
Feb 10, 2022
STOMP - Simple (or Streaming) Text Orientated Messaging Protocol
STOMP provides an interoperable wire format so that STOMP clients can communicate with any STOMP message broker to provide easy and...
The Tech Platform
Feb 10, 2022
Access Control List in Networking
An access control list is a list of objects; each entry describes the subjects that may access that object. Any access attempt by a...
The Tech Platform
Feb 10, 2022
Fake Windows 11 upgrade installers infect you with RedLine malware
Threat actors have started distributing fake Windows 11 upgrade installers to users of Windows 10, tricking them into downloading and...
The Tech Platform
Jan 18, 2022
State hackers use new PowerShell backdoor in Log4j attacks
Hackers believed to be part of the Iranian APT35 state-backed group (aka 'Charming Kitten' or 'Phosphorus') has been observed leveraging...
The Tech Platform
Jan 12, 2022
Setting up Keycloak and Securing Spring Boot Rest APIs
Keycloak is an open-source identity and access management solution which makes it easy to secure modern applications and services with...
The Tech Platform
Jan 12, 2022
How To Hack Any Web Application (Website)
This article is the third and final installment to this series. This is just a mere introduction tothese following topics. I will be...
The Tech Platform
Jan 4, 2022
What is YARA (Yet Another Recursive/Ridiculous Acronym) ? and What are YARA Rules?
YARA (Yet Another Recursive/Ridiculous Acronym) YARA is a tool aimed at (but not limited to) helping malware researchers to identify and...
The Tech Platform
Jan 4, 2022
How to write YARA rules for improving your security and malware detection?
Use an empty template to start YARA rules are text files, which follow a very basic, yet powerful, syntax. YARA rules always contain...
The Tech Platform
Dec 16, 2021
Certificate Based Authentication in ASP.Net core Web API
Certificate-based authentication is the use of a Digital Certificate to identify a user, machine, or device before granting access to a...
The Tech Platform
Oct 5, 2021
ERC 4337: account abstraction without Ethereum protocol changes
Account abstraction has for a long time been a dream of the Ethereum developer community. Instead of EVM code just being used to...
bottom of page