Gazar Avatar

GAZAR

Engineer•Entrepreneur•Storyteller
Engineer
Entrepreneur
Storyteller
GithubCode & Projects
LinkedinProfessional
TwitterThoughts & Ideas
Instagram Photos
Noghte Vorood Podcast Persian Tech
Email Contact
HomeVideosBlogReviews
HomeVideosBlogReviews
Talk
Let's Talk (Free)
  1. Home/
  2. Security

Security

5 items
Describe the difference between symmetric and asymmetric encryption, and when each is appropriate.
Describe the difference between symmetric and asymmetric encryption, and when each is appropriate.

March 14, 2024

What is a Buffer Overflow vulnerability, and how can it be exploited?
What is a Buffer Overflow vulnerability, and how can it be exploited?

March 14, 2024

Explain SQL Injection and how to prevent it in software applications.
Explain SQL Injection and how to prevent it in software applications.

March 14, 2024

What is Cross-Site Scripting (XSS), and how can it be prevented?
What is Cross-Site Scripting (XSS), and how can it be prevented?

March 14, 2024

OWASP Top Ten for Software Developers
OWASP Top Ten for Software Developers

March 13, 2024

Stay Connected

Get weekly insights on software engineering and leadership delivered to your inbox.

Rights Reserved © Gazar.dev 2025