Back

Vansh Khandelwal

Full Stack Web Devel...ย โ€ขย 8m

Security testing ensures that applications are free from vulnerabilities like SQL Injection, XSS, CSRF, and IDOR. SQL Injection occurs when unsanitized inputs allow attackers to manipulate database queries. This can be mitigated by using parameterized queries, preventing direct injection. XSS allows attackers to inject malicious scripts into web pages, and can be prevented by properly sanitizing or escaping user inputs. CSRF tricks users into executing unwanted actions; using CSRF tokens helps verify request authenticity. IDOR allows unauthorized access to data by manipulating object references, which can be avoided by implementing proper authorization checks. By integrating these security measures, you can safeguard your application from common attacks.

Reply
2

More like this

Recommendations from Medial

Image Description

Comet

#freelancerย โ€ขย 1y

Here are some essential SQL topics for data analysts: 1. Basic Queries: SELECT, FROM, WHERE clauses. 2. Sorting and Filtering: ORDER BY, GROUP BY, HAVING. 3. Joins: INNER JOIN, LEFT JOIN, RIGHT JOIN. 4. Aggregation Functions: COUNT, SUM, AVG, MIN, M

See More
1 Reply
1
4

Vasvi Seth

Cyber Security Stude...ย โ€ขย 1y

๐Ÿšจ Urgent Cybersecurity Alert: Log4Shell Vulnerability ๐Ÿšจ Attention Medial community, Have you heard about Log4Shell? It's not just another tech jargon. This critical vulnerability is shaking up the cybersecurity landscape, and here's why: Log4Sh

See More
Reply
6

Comet

#freelancerย โ€ขย 9m

Day 4: Sorting Data with ORDER BY Hey guys, letโ€™s make your SQL queries even more powerful with ORDER BY! This command helps you sort your resultsโ€”either ascending (default) or descending. Example: SELECT name, age FROM Students ORDER BY age D

See More
Reply
1

Vansh Khandelwal

Full Stack Web Devel...ย โ€ขย 1m

In the rapidly evolving digital landscape, APIs (Application Programming Interfaces) serve as essential connectors among software applications, enabling seamless communication between systems. However, their accessibility also makes them prime target

See More
Reply
3

Sanskar

Keen Learner and Exp...ย โ€ขย 15d

Day 25 of learning python as a beginner. Topic: database handling. I used to write simple programs which just showed some text in the console when I started learning python. I didn't used to store that data somewhere because I didn't know how to.

See More
Reply
Image Description
Image Description

gopal balar

Transforming Busines...ย โ€ขย 4m

40 Pakistani websites hacked after the Pahelgam attack. ๐Ÿคฏโ˜ ๏ธ ๐˜ผ๐™ฃ๐™™ ๐™ฉ๐™๐™š ๐™ข๐™–๐™ฃ ๐™—๐™š๐™๐™ž๐™ฃ๐™™ ๐™ž๐™ฉ? A 25 year old CEO who turned his #Hacking skills into a $10M+ startup.๐Ÿ”ฅ Meet Mayank Gandhi, the 25-year-old Indian ethical hacker and CEO of TMG

See More
4 Replies
4
25

Ansh Sarkar

Software, Physics, P...ย โ€ขย 5m

Iโ€™ve been diving deep into voice agents, and itโ€™s been an exciting challenge. Automating conversations isnโ€™t just about speech recognition but rather about understanding intent, handling ambiguity, and making interactions feel natural. Trust me that

See More
Reply
3
12
Image Description
Image Description

SHIV DIXIT

CHAIRMAN - BITEX IND...ย โ€ขย 10m

๐Ÿ“– DAILY BOOK SUMMARIES ๐Ÿ“– ๐Ÿš€ 20 Lessons from ๐Ÿ‘‰ ๐Ÿ”ฅ Competitive Advantage ๐Ÿ”ฅ โœจ By Michael E. Porter โœจ 1. Definition: Competitive advantage is achieved when a company can create more value for its customers than its competitors. 2. Types of Co

See More
3 Replies
7
13

AIGuts

Exploring AI's poten...ย โ€ขย 3m

What Is an AI Email Writer, and How Can It Improve Your Communication? Are you tired of spending too much time writing professional emails? A Free AI Email Writer can completely change the way you communicate. Whether you're drafting an important bu

See More
Reply
1
2
Image Description
Image Description

Vikas Acharya

ย โ€ขย 

Welbeย โ€ขย 3m

๐—ง๐—ต๐—ถ๐˜€ ๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ ๐—œ/๐—ข ๐˜„๐—ฎ๐˜€ ๐—ต๐—ฎ๐—ป๐—ฑ๐˜€ ๐—ฑ๐—ผ๐˜„๐—ป ๐˜๐—ต๐—ฒ ๐—ฏ๐—ฒ๐˜€๐˜ ๐—ผ๐—ป๐—ฒ. ๐Ÿญ๐Ÿฌ ๐—ถ๐—ป๐˜€๐—ฎ๐—ป๐—ฒ ๐—ฟ๐—ฒ๐—น๐—ฒ๐—ฎ๐˜€๐—ฒ๐˜€ ๐˜†๐—ผ๐˜‚ ๐—ฐ๐—ฎ๐—ป'๐˜ ๐—บ๐—ถ๐˜€๐˜€ ๐Ÿ‘‡๐Ÿป 1. Google released an Asynchronous coding agent Jules for free. It uses Gemini 2.5 Pro to work across y

See More
12 Replies
39
39

Download the medial app to read full posts, comements and news.