Photo by Mohammad Rahmani on Unsplash

Introduction

The most important aspect of any application is user input. Every application is primarily reliant on user inputs (providing sign in, signup functionalities). Thus, the majority of vulnerabilities that may occur are caused by user inputs too. …


Photo by Kaur Kristjan on Unsplash

Introduction

To identify and verify the users each and every application provides sign-in functionality to its user, since a lot of websites are now providing the sign in functionality it’s very hard for a user to remember the password they have chosen, and most of the times they need to reset…

Gupta Bless

Security enthusiast working to secure web for others.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store