Web developer, digital marketer and best friend of Spock.
External Blog Posts
- What is the Principle of Least Privilege?
- Core Integrity Verifications
- OWASP Top 10 Security Risks – Part I
- OWASP Top 10 Security Risks – Part II
- Understanding Zero-Day Vulnerabilities & Attacks
- The Impacts of Zero-Day Attacks
- Content Security Policy (CSP)
- How to Create Website Backups Using Command-line Tools
- How to Restore Website Backups from the Command Line