Users that use Single Sign-On (SSO) authentication can log into various apps and systems with just one set of login information. Using SSO, users only need to authenticate once to access a variety of sites without having to enter their credentials repeatedly. A typical authentication paradigm calls for a unique username and password for each…
Author: Muhamad Iqbal
Session Token Hack
Context: The 15.3 million followers to the popular YouTube channel Linus Tech Tips are now seeing videos for cryptocurrency scams instead of reviews of tech hardwares because the channel was hacked this morning. It’s the most recent incident in a string of high-profile YouTube accounts being compromised; con artists frequently access well-known accounts to rename…
API-First Approach
Prior to creating the user interface, an API-first approach to web development entails designing and creating the application’s API (Application Programming Interface). This strategy is predicated on the idea that the API serves as the application’s framework and that the user experience is constructed on top of it. A web development strategy that prioritises APIs…
Design Language
The collection of visual elements, principles, and guidelines used to create a consistent and cohesive aesthetic across a variety of design projects is referred to as design language. Everything from typography and colour schemes to iconography and layout is covered. A design language is a framework that designers can use to create a unified visual…
N+1 Problem in Laravel
When obtaining relational data from a database, a typical performance problem known as the “n+1 problem” in Laravel might occur. When you need to retrieve a group of records from one database table and then you need to retrieve associated records for each record from another table, the database is queried more than once. The…
Digital Immune System (DIS)
What?A type of security system that works similarly to the human immune system that helps to protect our body from illnesses and infections. The digital immune system is designed to protect our computer systems, devices, and networks from various types of cyber threats such as viruses, malware, and hackers. How it works?By continuously monitoring and…