Exploiting Software-DEFENSE PATTERN — Part 2

--

--

--

Cyber Security Analyst & researcher

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

So Easy MicroPython —NTP Clock, Counter, Timer, …, and IoT Display

Power BI — Time Intelligence

Journey into the IO Monad (Part 2)

Refactoring legacy code

How To Make Free Practice Worksheets for Your Kids

Spelling Worksheet Cover created on Canva.com

Bash scripting

System design part-3: Load Balancer

Rewind Dev Log #3

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Suresh Sundaram

Suresh Sundaram

Cyber Security Analyst & researcher

More from Medium

Installing MetaMask and Connecting to Binance Smart Chain

Salient points of Arrays in 2 mins

Clone of Nykaa Man using backend

How to Gain Maximum Clarity by Hosting Your Own Personal Retreat