Curated articles, resources, tips and trends from the DevOps World.
Sniffing attack or a sniffer attack is the context of network security, corresponds to theft or interception of data by capturing the network traffic using a sniffer Introduction In this article, we will be discussing what is a sniffing attack and how you can save yourself or an organization from a
This article demonstrates how to use Java to build a single sign-on application with two client applications and a single resource server. When developing applications, it’s often the case that you have a single resource server providing data to multiple client apps.
OAuth 2.0 and Session Management - what’s the difference? There seems to be a lot of misinformation on when OAuth 2.0 (henceforth referred to as OAuth) is appropriate for use.
I’m Serhat Can, Technical Evangelist at Atlassian and the author of “On Call”. I’ve spent years participating in and helping customers build on-call programs.
In this tutorial, we will understand how to design SOAP and REST services using Neoload to validate the performance of web services. In this tutorial, we will understand how to design SOAP and REST services using Neoload to validate the performance of web services.
This blog will give you a deep insight on Dynamic Partition Pruning used in Apache Spark and how this works in the newer version of Spark released. With the release of Spark 3.0, big improvements were implemented to enable Spark to execute faster and there came many new features along with it.
Information disclosure is a type of vulnerability in which a system inadvertently exposes confidential information. This post walks through an example of this flaw by looking at how environment variables can be misunderstood and misused in web applications.
Whether you love it or hate it, Helm is a ubiquitous tool for managing Kubernetes applications. You can use it in many different ways which is great, but can also be overwhelming.
The rise of DevOps can be referred to as a culture, movement, philosophy, or methodology. How you define the essence of DevOps and how to best apply its principles and practices depends on a number of factors involving organizational change and management processes.
The fact that we do not store sensitive information is well known, while dealing with containers, Kubernetes, cloud, and secrets we must avoid or should not commit sensitive information like Access keys, passwords, and SSH Private keys in the repository, even if the repository is private.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com