A virtual private network (VPN) extends a private network across a public
network and enables users to send and receive data across shared or public
networks as if their computing devices were directly connected to the private
network.
Recursion is when a function calls itself and is used mostly when it makes the
solution cleaner or gives better performance and many algorithms use it for those
purposes.
A proxy server is a server application or appliance that acts as an
intermediary for requests from clients seeking resources from servers that
provide those resources
Tor is free and open-source software for enabling anonymous communication. […]
Tor directs Internet traffic through a free, worldwide, volunteer overlay
network consisting of more than seven thousand relays to conceal a user’s
location and usage from anyone conducting network surveillance or traffic
analysis.
A pentesting environment provides all the tools needed to conduct our tests. It
ideally offers also protection against attacks and allows us to control (i.e.
save state, rollback, discard) our pentesting journey fairly painless.
An algorithm is a set of instructions for accomplishing a task. There are
various algorithms for all types of purposes we will look at 2 specifically in
this post starting with Binary Search.
It is common for software engineers to come across the same problem several
times resulting in a deja-vu effect. The reason being that there are common
problems that all Object-Oriented Software share. Design Patterns exist for
exactly that reason. They a documented and established way of solving a problem.
phpMyAdmin is a great tool for managing MySQL databases and is available as
a docker image. The setup in a docker-compose environment is not as straight
forward as it seems at first sight. That is why I break things down to make it
more managable and easier to understand.
Docker is an incredible tool that simplifies developement environemnt setup.
It allows us to configure and save complex environments and their dependencies
in a single image which we can execute at will. Nonetheless we have to configure
our images and bundler is no exception.