Techniques For Designing Your API and Microservices
A design that initially looks good may not be the best design to easily solve the problems at hand. Too often, our initial assumptions about our API and microservice designs…
Before you design your API, model your API
I’m often asked which is the better style of API: REST, GraphQL, or gRPC. My answer is always: “I’m not sure. What does your API model say?” At this point,…
API Design Guidance: Long-Running Background Jobs
The REST style is particularly suited for synchronous APIs, where requests generally return quickly (less than a few seconds). For operations that take a longer time to complete, it may…
Adding Salt to Hashing: A Better Way to Store Passwords
A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like hash tables
Hashing Passwords: One-Way Road to Security
A strong password storage strategy is critical to mitigating data breaches that put the reputation of any organization in danger. Hashing is the foundation of secure password storage.
Top 50 Spring Boot Interview Questions That Are A Must in 2022
Spring Boot is continuously coming with new ways to make the process of building applications easier. Today, it’s one of the most used technology with Java to create web applications.…
Top 50 Security Interview Questions and Answers 2022
To help you crack the Security interview, we’ve compiled this list of top Security interview questions and answers. This Security Interview Questions blog is divided into two parts: Part A…
The Top 10 SQL JOIN Interview Questions and How to Answer Them
Have you ever wondered what SQL JOIN questions you might be asked in an interview? Do you feel prepared to answer them? This article covers the most common SQL JOIN…
Web API Security and Best Practices
APIs often self-document information, such as their implementation and internal structure, which can be used as intelligence for a cyber-attack. Additional vulnerabilities, such as weak authentication, lack of encryption, business…