GAZAR
Principal Engineer
Engineer
•
Mentor
Mentor
Github
Linkedin
Twitter
Instagram
Email
Home
Videos
Blog
Reviews
About
Tools
Frontend
Backend
Advanced
Home
Videos
Blog
Reviews
About
Let's Talk (Free)
Talk
Home
/
Security
Security
5 items
Describe the difference between symmetric and asymmetric encryption, and when each is appropriate.
March 14, 2024
What is a Buffer Overflow vulnerability, and how can it be exploited?
March 14, 2024
Explain SQL Injection and how to prevent it in software applications.
March 14, 2024
What is Cross-Site Scripting (XSS), and how can it be prevented?
March 14, 2024
OWASP Top Ten for Software Developers
March 13, 2024