web analytics

SSH Agent, SSH Keys/Identities, Composer, Repositories in composer.json on Windows 11

So my client shared a repository on a private GitLab platform with me. I have access to the platform and the repo and added SSH key to my account that I generated using PuTTY Gen. I then used TortoiseGit to clone it using my SSH key. It worked as expected and the repository was cloned into the WWW directory of my WAMP server.

Read more

30 web application security checklist

30 web application security checklist

Web application security refers to the practice of securing web-based applications from cyber threats and vulnerabilities. With the increasing reliance on web-based applications for business and personal use, ensuring the security of these applications has become essential. Web application security involves identifying potential security risks, implementing security measures such as firewalls, encryption, and access controls, and regularly testing and monitoring the applications for vulnerabilities. Failure to secure web applications can result in data breaches, loss of sensitive information, financial losses, and damage to a company’s reputation.

Read more