sachindra@work

sachindra@work @sachindra149

About: There is always a simple way to learn & implement things no matter how complicated that might sound 👋👋👋

Location:
India
Joined:
Feb 26, 2018

sachindra@work
articles - 20 total

AWS Services in scope for AWS Certified Machine Learning Engineer - Associate Exam (AWS-MLA- C01)

The following list contains AWS services and features that are in scope for the exam. This list is...

Learn More 0 0Mar 8

Understanding Pass-Through Authentication (PTA) and Password Hash Synchronization (PHS)

In hybrid environments where on-premises Active Directory (AD) integrates with Azure Active Directory...

Learn More 0 0Feb 22

Threat Modeling in Cybersecurity

Threat Modeling is a structured approach to identify, assess and mitigate potential security threats...

Learn More 0 0Jan 26

EDR vs. XDR vs. SIEM vs. MDR vs. SOAR

The world of Cybersecurity is buzzing with tech jargon and abbreviations. Many enterprises prefer to...

Learn More 2 0Jun 26 '24

ServiceNow and MID Server

ServiceNow is a cloud-based platform that helps organizations with a unified solution to streamline...

Learn More 1 2Apr 15 '24

IPSec vs MACSec

There is no definitive answer to which protocol is more secure, as they have different advantages and...

Learn More 0 0Oct 16 '23

Grey Box vs Double Grey Box Testing

Grey box testing and double grey box testing are two types of software testing methods that differ in...

Learn More 0 0Sep 24 '23

Blind Testing vs Double Blind Testing vs Triple Blind Testing

Blind Testing and Double-Blind Testing are two types of penetration testing methods that differ in...

Learn More 3 1Sep 24 '23

DLP vs DRM - Understanding the differences

DRM stands for Digital Rights Management, which is a software that helps protect the intellectual...

Learn More 1 0Sep 12 '23

Azure Transparent Data Encryption

Azure Transparent Data Encryption or TDE is a technique of encrypting data at rest, mainly database f...

Learn More 0 0Jun 3 '21

OSI Model

OSI or Open Systems Interconnection is a conceptual model explains how networks communicate. It descr...

Learn More 4 2Aug 30 '20

Basic Network Utilities

IPCONFIG: This command displays all the current TCP/IP network configuration values. It gives you inf...

Learn More 7 0Aug 30 '20

Networking

1) Transmission of a data across network takes place in the form of data packets. Headers play an imp...

Learn More 3 0Aug 30 '20

LDAP Injection

LDAP or Lightweight Directory Access Protocol is a methodology designed to read data in a directory,...

Learn More 1 0Jun 28 '20

SSL: What it is and types of SSL

SSL stands for Secure Sockets Layer. It is a way to keep the communication between a client and serve...

Learn More 8 0May 4 '20

All about SIEM

SIEM stands for "Security Information and Event Management". It is a set of tools and services that o...

Learn More 3 0Apr 11 '20

Unsafe use of target=”_blank”

Developers have been frequently using this attribute to open a new webpage. But this attribute, thoug...

Learn More 7 0Apr 10 '20

Clickjacking

Clickjacking refers to any attack where is user is tricked into clicking any unexpected web element u...

Learn More 2 0Apr 10 '20

JavaScript Promises - Building a Simple Promise Example

Promises are one of the most important topics in Javascript. This post is simply to help us understan...

Learn More 10 0Sep 29 '19

Javascript Development & Security

Javascript is a high level, dynamically typed interpreted, sixth most popular programming language. I...

Learn More 8 0Sep 25 '19