Rest Client with OAuth2
Simple RestClient Simplest way is to configure a RestClient like this:
Simple RestClient Simplest way is to configure a RestClient like this:
https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...
Prerequisites
Exceptions In Java, you can to a lot with exceptions. You should use and handle exceptions the same way in your project. The mess starts when you mix differe...
I learned in 2007 in computer science class to use inheritance to achieve polymorphism-like behaviour. You just need to build a good inheritance tree to abst...
Shows how to create an immutable object (Solution by Joshua Bloch from effective java)
null versus ResultWrapper Example DataAccessObject Every project will have some kind of data access object. At some point you need to decide a pattern how yo...
MagicNumbers/string Refactoring: Introduce constant with a meaningful name. But don’t over do it. If the constant is only used once, it might be better to le...
general idea
Exceptions In Java, you can to a lot with exceptions. You should use and handle exceptions the same way in your project. The mess starts when you mix differe...
I learned in 2007 in computer science class to use inheritance to achieve polymorphism-like behaviour. You just need to build a good inheritance tree to abst...
Shows how to create an immutable object (Solution by Joshua Bloch from effective java)
SC-100: Microsoft Cybersecurity Architect https://aka.ms/courseSC-100
https://learn.microsoft.com/en-us/azure/container-apps/compare-options
Training
Default way The normal approach would be to call the azure cli command: az webapp deploy --src-url. Also the standard ADO pipeline task just wraps this call....
Further infos: https://docs.microsoft.com/en-us/azure/api-management/soft-delete
When a keyvault is deleted via azure portal it is actually only soft-deleted. The reason for this is to protect the user from deleting their secrets. After a...
General infos https://www.hacking-lab.com/events/hackvent-2022
Writeup Try hack me advent 2022
Access Pwnbox is a VM running by HackTHeBox. Via OpenVPN (OVPN) you can connect your own computer to the hackthebox network.
1 - Sp4c3 Inv4d3r5!
null versus ResultWrapper Example DataAccessObject Every project will have some kind of data access object. At some point you need to decide a pattern how yo...
general idea
I learned in 2007 in computer science class to use inheritance to achieve polymorphism-like behaviour. You just need to build a good inheritance tree to abst...
Shows how to create an immutable object (Solution by Joshua Bloch from effective java)
Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...
Create a new SonarQube project In my case you would need to order this internally via devops self-service.
OpenHack Documentation
Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...
Create a new SonarQube project In my case you would need to order this internally via devops self-service.
OpenHack Documentation
https://learn.microsoft.com/en-us/azure/container-apps/compare-options
Default way The normal approach would be to call the azure cli command: az webapp deploy --src-url. Also the standard ADO pipeline task just wraps this call....
Training
OpenHack Documentation
Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...
Following this tutorial: link
SC-100: Microsoft Cybersecurity Architect https://aka.ms/courseSC-100
https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...
https://learn.microsoft.com/en-us/azure/container-apps/compare-options
general idea
1 - Sp4c3 Inv4d3r5!
When a keyvault is deleted via azure portal it is actually only soft-deleted. The reason for this is to protect the user from deleting their secrets. After a...
Further infos: https://docs.microsoft.com/en-us/azure/api-management/soft-delete
Default way The normal approach would be to call the azure cli command: az webapp deploy --src-url. Also the standard ADO pipeline task just wraps this call....
Default way The normal approach would be to call the azure cli command: az webapp deploy --src-url. Also the standard ADO pipeline task just wraps this call....
Prerequisites
Prerequisites
Access Pwnbox is a VM running by HackTHeBox. Via OpenVPN (OVPN) you can connect your own computer to the hackthebox network.
Writeup Try hack me advent 2022
Writeup Try hack me advent 2022
General infos https://www.hacking-lab.com/events/hackvent-2022
I bought a rubberducky from hak5 and this is what I learned:
I bought a rubberducky from hak5 and this is what I learned:
I bought a rubberducky from hak5 and this is what I learned:
Following this tutorial: link
Following this tutorial: link
Following this tutorial: link
Create a new SonarQube project In my case you would need to order this internally via devops self-service.
Create a new SonarQube project In my case you would need to order this internally via devops self-service.
Training
Training
https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...
https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...
Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...
https://learn.microsoft.com/en-us/azure/container-apps/compare-options
https://learn.microsoft.com/en-us/azure/container-apps/compare-options
MagicNumbers/string Refactoring: Introduce constant with a meaningful name. But don’t over do it. If the constant is only used once, it might be better to le...
MagicNumbers/string Refactoring: Introduce constant with a meaningful name. But don’t over do it. If the constant is only used once, it might be better to le...
Simple RestClient Simplest way is to configure a RestClient like this:
Simple RestClient Simplest way is to configure a RestClient like this:
Simple RestClient Simplest way is to configure a RestClient like this:
null versus ResultWrapper Example DataAccessObject Every project will have some kind of data access object. At some point you need to decide a pattern how yo...
I got a table with hierarchical data and I want to have a tree structure out of it. Each row represented a business unit and its parent and the parent of the...
I got a table with hierarchical data and I want to have a tree structure out of it. Each row represented a business unit and its parent and the parent of the...
SC-100: Microsoft Cybersecurity Architect https://aka.ms/courseSC-100
SC-100: Microsoft Cybersecurity Architect https://aka.ms/courseSC-100