In computer programming, the meaning of “profiling” is “finding and optimizing those resources that can decrease the response time, cache time, interruptions, and usage of individual instructions in a computer program.”
Simply put, we can implement profiling to improve the execution timing of a program and reduce the utilization of the CPU resources. Most applications are now hosted on the cloud. If you utilize those resources carefully, you can reduce the cost that you incur on them. This will also make your code more efficient.
“Error Reporting” is used to generate the errors a program is causing. We can use this to find the problematic statements in the program such as Variable not initialized, Stack trace related errors, and kernel related errors. So it’s a very good function to detect and remediate the runtime errors. Generally developers did it in the developing phase.
But think about that condition where developers…
Due to existence of DNS Server, there is no need to remember typical IP address as DNS server converts those domain name to their corresponding IP address. There are couple of DNS records that are needed to be published just to use the services such as email or something.
Everybody knows about Python. It’s now the second-most popular programming language worldwide, having overtaken Java. Not only is it used widely for machine learning and data science, but it’s also easy to learn for beginner programmers because of its easy code syntax, mimicking the English language.
Before moving further please take a look at my previous blog. you can easily understand what are business logic vulnerabilities and how they pose significant risk to web applications.
Now moving forward and look on another perspective of business logic vulnerability where user inputs are being used for exploitation
”User input” are those values or actions for which user interactions are needed such as entering any value from the keyboard, clicking on a button and finally submitting those values.
So we understand that users can enter anything or values that belong to any data type but to maintain application…
In application security, the most common term we hear is vulnerability that means weakness in the system that can be exploited and which poses a threat to an infrastructure or organization but there are few parameters that decide how severe a vulnerability is, these parameters combined decides the CVSS of the vulnerability. Greater the CVSS score, severe the vulnerability.
CVSS stands for common vulnerability scoring system where an organization or pen tester can use different parameters to rate the vulnerabilities and decide its severity. CVSS is a numerical representation of vulnerability’s severity also known as “Base score”. Value of the…
If a server sends new response to each and every HTTP then it may overload the server because response may contains the images, videos etc. overloading the server means that the performance of the website will not be degraded and users will be affected.
To increase processing time and decrease latency, organizations implement caching on the website. Even CPU does that by using a cache memory which provides very fast data access. So the website do the same in order to improve the efficiency
Web cache poison can posed a significant threat to the user. If the attacker was able…