SourceIvan NovikovThe Hand-y Etiquette of Modern All-Remote Culture1 year agoIvan NovikovOpen in Source#microsoft#git#blogWhat is threat modeling ❓ Definition, Methods, Example2 years agoIvan NovikovOpen in Source#blogWhat is an SSL certificate ❓ Meaning and Types2 years agoIvan NovikovOpen in Source#blogWhat is Cross Site Request Forgery CSRF | Example and Methods of protection2 years agoIvan NovikovOpen in Source#csrf#blogServer side template injection — SSTI vulnerability ⚠️2 years agoIvan NovikovOpen in Source#vulnerability#blogWhat is XMPP ❓ — Extensible Messaging & Presence Protocol2 years agoIvan NovikovOpen in Source#blogWhat is Cryptojacking Attack ❓ Definition and Prevention2 years agoIvan NovikovOpen in Source#blogWhat is API Abuse ❓ Prevention measures.2 years agoIvan NovikovOpen in Source#blogWhat is RAT Remote Access Trojan ❓ Detection and Removal2 years agoIvan NovikovOpen in Source#blogWhat is SAML authentication ❓ How does it work ❓2 years agoIvan NovikovOpen in Source#blog123