In the present digital world, we are increasingly dependent on online solutions to carry out our day-to-day activities. To carry out these activities, we have to access multiple applications and web-based portals. As the number of systems increased, proper identity management and authentication became increasingly important. Whether you are a programmer, a frustrated end-user, or a manager in charge of securing an application, remembering a set of credentials for accessing multiple systems gets very difficult and there is a high possibility of forgetting those credentials.
To prevent this, organizations have recently started using centralized authentication to access all their internal…
Most software applications are designed using the hexagonal architecture model. In such a model, you put outputs and inputs at the edge of the design. The central logic or the application’s core logic is separated from any outside interventions.
The outputs and inputs at the edge mean the swapping of their handlers is done without altering the core code. The major appeal of using hexagonal architecture is that it makes the testing of code easier.
Tests are made more stable with the ability to swap in the fakes. The hexagonal architecture was a clear departure from layered architecture. In a…
Earlier In the programming world, everything was developed in a monolithic fashion — the code used in the front end, middle layer, and database layer were being put in a single solution.
Then as time evolved, scenarios changed and the business logic along with the database connectivity got separated from the front-end piece of code. This provided quite a few advantages -
Scripting attacks are a major security issue faced by thousands of businesses and websites around the world. Moreover, Cross site scripting contributes to a majority of all the scripting attacks out there.
With so much damage and high financial drawbacks, every developer and website manager looks to prevent cross scripting attacks. But in the pursuit of preventing one evil, we have completely downplayed the presence of another evil — cross-site request forgery attack.
In this blog post, we’ll take a look at what is a cross-site request forgery (CSRF) attack and understand how it’s carried out. …
Consider a scenario where you are logging in to your account on a website. You enter your username and then your secret password. But when you hit ‘Enter’ the page loads up and pops us the same login screen again.
You think that you might have typed in the wrong password. So you type your username and password one more time. Only this time you are able to log in to your account. After you’re done with your work, you close the tab.
But the next morning you’re in for a big shock. Your account has been suspended and you’ve…
Design patterns in the software world aid in developing faster and tested paradigms. It addresses a futuristic issue which the code (or the developer) will not encounter until it the code is implemented.
In general, design patterns increase code reusability and improve code readability. There are three categories — Creational, Structural and Behavioral.
Creational deals with class instantiation techniques. Structural deals with class object composition and provides ways to add new functionality to a class. Behavioral deals with how the object of the classes communicates.
In this blog, we are going to see a decorator pattern that falls under the…
Most developers are accustomed to working with CRUD operations(Create, Read, Update and Delete) that help to divide tasks in a system. But the complications that this practice brings in due to different frameworks, solutions, and sophisticated infrastructure, makes the work of developers tedious.
One of the main concerns regarding this is the increasing number of representations your model can have when the application must serve more and more clients. …
Choosing a CMS for your business is never easy. But it looks like you’ve rounded up your options and landed on Kentico for now. In this post, we will explain why choose Kentico over other CMS.
Table of Contents
Kentico was founded by Petr Palas in 2004. According to their website, the original idea for Kentico was born from the bachelor thesis of Petr. What started out as a one-man operation, slowly gained heat and became what Kentico is today.
By 2008, Kentico was named as one of the “fast…
There are hundreds of choices when it comes to open source systems management tools. But we wanted to make your life easier by comparing the top 2 tools against each other — Chef and Puppet. We’ll also understand their pros, cons, and similarities.
Table of Contents
Chef is an open-source automation platform that allows you to transform infrastructure into a set of codes. The beauty about Chef is that it works with most environments…
Various technologies have evolved with time in the area of application development. Still, developers are struggling to make applications quicker, more reliable, responsive, and user-friendly.
Ajax Control Toolkit is a solution for app developers to develop reliable and faster apps. We can already see its usefulness in applications like Google Maps, YouTube, Facebook, Gmail, etc. In this blog let us understand what is Ajax Control Toolkit in ASP.NET Core and how is it useful.
Table of contents