Top Posts
ZAP Penetration Testing: A simple Tutorial to Detect Vulnerabilities
ByGeethu Alexander

Penetration testing (otherwise known as pen testing, or the more general security testing) is the process of testing your applications for vulnerabili...

Read More
How to get a Node.js application into a Docker container?
ByJose Gonsalo

Linux container technology that Docker looks built upon has been in the tech ecosystem since 2008. However, the sudden hype of Docker seems awaken fro...

Read More
How Google Maps helps developers to predict travel time using a new API?
ByJose Gonsalo

Google, a plethora of technologies, is really inventing some future-driven outputs that truly happen to make every internet user's life better. The rec...

Read More
How the most commonly used Logic Controllers are employed in Apache JMeter?
BySoumya KM

As the name implies, Logic Controllers are used to control the processing order of Samplers. That means Logic Controllers can change the order the use...

Read More
MySQL Vs Amazon Aurora: Is Aurora a Game-changer in Database Market?
ByJose Gonsalo

Earth's biggest e-commerce player, Amazon, recently launched their all new relational database engine – Aurora. 'Aurora' is a Latin originated word def...

Read More
Getting started with “Pythonista” : Building iOS apps in python
ByDona Feble

Ole Zorn introduced Pythonista a code editor for developing iOS apps in python programming language in 2012 and is available at appstore for $6.99 ...

Read More
Latest Posts