I am sure If you’re interested enough to read this blog, you are familiar with the zero-day exploit discovered recently in the log4j library which allows remote code execution. I believe we can agree that it is the most dangerous type of vulnerability. In this post, we’ll examine which applications are vulnerable, how this exploit works (with a demo application), and what actions you can take to protect yourself.Read More »Understanding Log4Shell -A Log4J Zero-Day Exploit
Sorting data efficiently has always been a challenging task in computer science but there is also another challenge you will encounter after you tackle the sorting. Keeping your data sorted while updating it.
Imagine having a CONTENT table that stores thousands of contents and you allow content management users to manipulate the order of the contents. For example, a cms user might move content from the 5002nd row to the 13th row. To provide this feature, there are a couple of options you can choose from.Read More »Lexorank — Managing Sorted Tables With Ease
Circuit Breakers are one of the best tools in our toolbox to use while creating a backend structure with dependent modules. In this post, I will try to set up a basic Hystrix Circuit Breaker example and demonstrate some different configurations.
For demonstrating this concept I’ve created two Spring Boot applications called producer and consumer. The producer returns an integer counter and increases the value after each request but when the counter is between 5 and 20 it will wait for 5000 ms before returning the counter.Read More »Basic Hystrix Circuit Breaker Implementation
While Whatsappocalypse continues to grow at a rapid pace I’ve decided to take it to the next level and help you pay attention to a different aspect of mobile privacy. Many apps we’re using are collecting information about our devices and what’s in them. This might sound less creepy than WhatsApp spying on your chat but I can assure you it is not in the slightest way less important. I am talking about location, installed applications, device name, device model, etc. It might not feel very important but how would you feel if someone grabs your phone and views a list of installed applications, photos, downloaded files, and whatnot. But there is an option like Run Android Apps In Sandbox!Read More »Run Android Apps In Sandbox For Privacy [With Island]
Hello Everyone! I would like to share a trick that took me some time to figure out. I’ve started using Rider for Unreal Engine which is an IDE developed by JetBrains. As a full-time Backend Java developer, I use IntelliJ for development. So when I started my game development journey I was not too comfortable with the Visual Studio. You can guess the level of my excitement when I heard the news about an IDE for Unreal Engine developed by JetBrains. Needless to say, I’ve joined the test program as soon as it gets online and started to develop my games with the help of Rider. But the issue was, I didn’t know how to debug with Rider.Read More »Debug C++ with Rider for Unreal Engine