Sign in

| Learner |

Let’s talk about Full-stack development- MERN. This blog covers theoretical concepts alone.

Web Development — designing a website or application built for an awesome user experience. Then what is full-stack development?

Full Stack Development

Simply, working on both the front-end and back-end of the application. More specifically, stack means different technologies being used to build applications. That application concentrate on both front-end(client) and back-end(server) also take care of the database.

We all know HTML, CSS, JavaScript, jQuery, PHP,, python, java are used in web development to build websites/applications more interactive. But in full-stack development JavaScript(MERN, MEAN) plays a major role.

Best JS…

Let’s discuss Node.js. Why we use node.js for single-page application?

We know JS language is used to create applications more interactive. Now, it is used with desktop, mobile, and web applications and servers.


Web applications which we request from the client are stored in a web server and we termed this as client-server communication. Now, we just look at some kind of requests that we normally know.

If a client requests some kind of calculations to the server then it takes x milliseconds and returns the result as the response. This is called CPU intensive.

If a client requests any…

Lets start about fingerprints and its related stuffs. Moreover, we see about how fingerprints are identified.

Introduction to fingerprints

SQL statements: DDL, DQL, DML, DCL, TCL.

SQL-Structured Query Language is a standard language for storing, manipulating and retrieving data from databases.

SQL statements are categorized into

  1. DDL (Data Definition Language),
  2. DQL (Data Query Language),
  3. DML (Data Manipulation Language),
  4. DCL (Data Control Language),
  5. TCL (Transaction Control Language),

Sometimes, Select query which we categorized as DQL may be considered in DML.


Data Definition Language is used to define database schema. Also, to create and modify the structure of database(db).

Database schema means a skeleton / structure which represents logical view of the entire database.


To create database or its…

How exactly cloud computing emerged?

Enterprise Architecture(EA) is a conceptual model that defines the structure and operation of an organization. The conceptual model is an abstraction of things that are made of concepts. These concepts help people (stakeholders) to know, understand, and analyze.

Ex: Consider an organization which was started recently and how it will compete against its competitor and withstand the modern market environment.

The organization should adapt the technology upgrade so the organization transforms itself to thrive in the future. Apart from technology changes they should shine against their competitors who may be a startup or a legacy…

Grab it ! Gain it !


According to OWASP, it is a nonprofit foundation that works to improve the security of software.

Simply, OWASP provides standard Top 10 security risk documentation which tells about the most critical web application security risks. Using this document, to ensure that the companies adopt and defend from the security risks. Also, if you are reporting any bugs to a company they will consider this document for vulnerability scope.

Top 10 Web Application Security Risks:

  1. Injection,
  2. Broken Authentication,
  3. Sensitive Data Exposure,
  4. XML External Entities (XXE),
  5. Broken Access Control,
  6. Security Misconfiguration,
  7. Cross-Site Scripting XSS,
  8. Insecure Deserialization,

A computer virus is a type of computer program which contains malicious executable statements that are self -reproducing in nature. It is a harmful activity which infects the host computer by deleting some files, acquisition of hard disk space or CPU time, stealing/corrupting personal data, target one path/file and corrupting it etc.

A computer virus was coined by Fred Cohen in 1984. But this name is given for its nature (self -replicating the program that infect the host computer or corrupt the software without user consent which is similar to biological virus).

Self -replicating means making an exact copy of…

Bug Bounty program — A crowd-sourced platform that connects many organizations globally and encourages the disclosure of in-scope vulnerabilities by independent ethical hackers.

What is meant by crowd-sourced platform ?

According to Google, crowd-source means obtain (information or input into a particular task or project) by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.

Example: Bugcrowd- Security crowdsourced platform where many organizations tell their undisclosed vulnerabilities and encourages the people who report the in-scope vulnerabilities by giving rewards as bounties or points.

Bug Bounty Platforms: (some only listed)




When we talk about cybersecurity, we think about the data breaches, attacks, threats, vulnerabilities, phishing, user identity theft, product scam and so.But could you see data is the major key point one among them. These data may get from online or offline.

Simply, Cybersecurity means prevention or detection of vulnerability in the system or network.

How we get data ?

In 1989, Tim Berners Lee invented the World Wide web (www) which facilitates the sharing of information using hypertext. This leads to share, create, manipulate, derive data that may be spurred from more devices connected to the internet.

These data…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store