Development
Featured
Testing

Mango: A No-SQL Schema Inference Engine

Recently, my team had to work on a clustered web-based project that had a No-SQL backend; MongoDB to be specific. Having come from a SQL era, this was the first big No-SQL project...

What’s Inside No SQL

No SQL is a new buzz word in conventional computing technique. Basic information can be referred from here. It is all together new way to create, manipulate and delete the...

My Experiences with Scala – MongoDB

I would like to share my own experiences on - ‘Scala’ and ‘Mongo DB’.   ‘Scala’ as a language was introduced in the market in 2004 and ‘Mongo DB’ in...

The DOJO Framework

Mobile industry is upgrading itself quite frequently. That’s the reason we are seeing various frameworks, operating system are getting released. So being a mobile application...

iOS6, Jelly Bean, Windows8 – Who is the prettiest of them all?

Apple introduced iOS6   last week and is causing some ripples in an already volatile OS market. It introduced some 200+ new features and claims that it will take your iOS...

A 360 on Microsoft’s Tablet Strategy

The Good Gartner states that Apple will sell 60 million units of iPad in 2012 vs. 400 million PCs. This statistic is something which got Microsoft on its toes. They had to do...

HTML5, Native or Hybrid…where is the herd heading?

The debate is overblown and the mobile technology landscape is incredibly confusing. There are numerous choices from HTML5 based mobile web application to native application...

Choosing the Right Technologies for Enterprise Mobile Development

In the last blog, we briefly looked at the different options for mobile application development. In this post, let’s explore the various technologies available for enterprise...

Information Gathering — Web Application Analysis

Till now we have seen theory part of web application security. Now I will try to include various ethical hacking/ penetration testing aspects with visual / video. At initial level...

A Day At : HTML5 Web Camp Organized by Microsoft in Pennsylvania : Session ̵...

Preface: The HTML5 Standard   has gained immense popularity and is being widely adopted by the web and mobile development community and web browsers including mobile device...

Vulnerability Assessment IV

Scan Types: Central Scan or Individual Scan? It is always the question which type of scan is more effective? Both scans have pros and cons. For example Central Scan is...

Vulnerability Assessment – ||

In previous blog post we understood about what is vulnerability and what is exploit. In this blog post we will look at why any organization should go for vulnerability...

Vulnerability Assessment – Part I

This series blog post is going to give you some details regarding vulnerability, what is vulnerability assessment, why vulnerability assessment. It will not give you in depth idea...

Blocking Web Attacks – Part 1 (Covers Basic SQL Injection Prevention)

In series of Blocking Web Application Attack I will try to uncover different types of web application attack surfaces and how we can test and fix them to prevent future...

Load More