All Stories
Opps - man_in_the_middle_attack
Man in the middle attackMan-in-the-middle (MITM) attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that...
In tutorial, man_in_the_middle_attack, opps, Jan 23, 2025Opps - no_image
KanbanKanban is an agile framework used for project and task management. At its core are continuous improvement and just-in-time development, which allows teams to stay on top of any ...
In tutorial, no_image, opps, Jan 23, 2025Opps - fdd
Feature Driven Development (FDD)Feature-driven development (FDD) is an iterative and incremental software development process that follows the principles of the agile manifesto. The i...
In tutorial, fdd, opps, Jan 23, 2025Opps - xp_lifycycle
Extreme Programming (XP)Extreme programming is a software development methodology that’s part of what’s collectively known as agile methodologies. XP is built upon values, principles,...
In tutorial, xp_lifycycle, opps, Jan 23, 2025Opps - agile
AgileAgile software development methodologies often called Agile, preach flexibility and pragmatism in the application delivery process. This iterative software development approach d...
In tutorial, agile, opps, Jan 23, 2025Opps - ssl_certificate_work
SSL certificatesAn SSL certificate is a bit of code on your web server that provides security for online communications. When a web browser contacts your secured website, the SSL cert...
In tutorial, ssl_certificate_work, opps, Jan 23, 2025Opps - ct_components
Certificate transparencyCertificate Transparency (CT) is an Internet security standard for monitoring and auditing the issuance of digital certificates.
In tutorial, ct_components, opps, Jan 23, 2025Opps - no_image
Certificate pinningCertificate pinning is a security mechanism used in the context of authenticating client-server connections, particularly in the context of secure communication ove...
In tutorial, no_image, opps, Jan 23, 2025Opps - asymmetric-encryption
Asymmetric Key EncryptionAsymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys - one public key and one private key - to encryp...
In tutorial, asymmetric-encryption, opps, Jan 23, 2025Featured
-
Testing - no_image
In tutorial, no_image, testing, -
Live_Data
In featured, tutorial, android, -
Kt Coroutine
In featured, tutorial, android, -
Flutter interview questions
In Flutter, oneview, -
Hilt DI Deep Dive
In Android, DI,