Posts

Security

Audio Steganography In More Detail

Audio steganography is a technique for hiding information within an audio file so that only the intended recipient knows of the hidden …

11 min
Design Pattern

The Compensating Transaction Pattern

The Bird-Eye View A Compensating Transaction Pattern is a technique used to ensure consistency when multiple steps are involved in a …

16 min
Java

Serialising in Java - Birds Eye View

Serialisation in Java is implemented to convert the state of an object into a byte stream, which can be quickly persisted to a file or sent …

16 min
Security

Contextual Analysis in Cybersecurity

Contextual analysis in cybersecurity involves examining events, actions, or data within the broader context of an organization’s IT …

16 min
Secure Coding Practices

What is a Common Weakness Enumeration - CWE

CWE stands for Common Weakness Enumeration. It is a community-developed list of software and hardware weakness types that can serve as a …

9 min
Security

Infection Method - Sub-Domain Takeover

A subdomain takeover is a type of cybersecurity vulnerability that occurs when an attacker gains control of a subdomain of a website or a …

8 min
Security

Infection Method - Domain Takeover

In this post, we will look at another method of infection. These are the attack vectors via domain names. This can happen at the main level, …

7 min
EclipseStore

EclipseStore High-Performance-Serializer

I will introduce you to the serializer from the EclipseStore project and show you how to use it to take advantage of a new type of …

10 min