All Stories

Opps - man_in_the_middle_attack

Man in the middle attackMan-in-the-middle (MITM) attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that...

In tutorial, man_in_the_middle_attack, opps, Jan 23, 2025

Opps - no_image

KanbanKanban is an agile framework used for project and task management. At its core are continuous improvement and just-in-time development, which allows teams to stay on top of any ...

In tutorial, no_image, opps, Jan 23, 2025

Opps - fdd

Feature Driven Development (FDD)Feature-driven development (FDD) is an iterative and incremental software development process that follows the principles of the agile manifesto. The i...

In tutorial, fdd, opps, Jan 23, 2025

Opps - xp_lifycycle

Extreme Programming (XP)Extreme programming is a software development methodology that’s part of what’s collectively known as agile methodologies. XP is built upon values, principles,...

In tutorial, xp_lifycycle, opps, Jan 23, 2025

Opps - agile

AgileAgile software development methodologies often called Agile, preach flexibility and pragmatism in the application delivery process. This iterative software development approach d...

In tutorial, agile, opps, Jan 23, 2025

Opps - waterfall_model

Waterfall methodology

In tutorial, waterfall_model, opps, Jan 23, 2025

Opps - ssl_certificate_work

SSL certificatesAn SSL certificate is a bit of code on your web server that provides security for online communications. When a web browser contacts your secured website, the SSL cert...

In tutorial, ssl_certificate_work, opps, Jan 23, 2025

Opps - ct_components

Certificate transparencyCertificate Transparency (CT) is an Internet security standard for monitoring and auditing the issuance of digital certificates.

In tutorial, ct_components, opps, Jan 23, 2025

Opps - no_image

Certificate pinningCertificate pinning is a security mechanism used in the context of authenticating client-server connections, particularly in the context of secure communication ove...

In tutorial, no_image, opps, Jan 23, 2025

Opps - asymmetric-encryption

Asymmetric Key EncryptionAsymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys - one public key and one private key - to encryp...

In tutorial, asymmetric-encryption, opps, Jan 23, 2025