Pragati Singh ⭐️⭐️⭐️⭐️⭐️

Sign in

Let’s understand security flaws in web based applications

Following are stack where we miss security measurements like…

Underlaying Architecture

  • Hardware, Network, PKI, and authentication

Poor coding practice

  • Lack of proper input validation

No encryption of

  • Data in transit

Security at Network

Photo by Damien TUPINIER on Unsplash

REST clients are apps that can be used to make HTTP requests to an API. Even though they are often referred to as “REST clients,” they typically can make requests to other types of HTTP APIs as well. As you need to use a REST client to make requests to the APIs you create. This document explains the benefits of a few REST clients. Feel free to choose the REST client that makes sense for you.

  • Apigee trace tool
  • curl
  • HTTPie
  • Postman
  • Hoppscotch
  1. Apigee trace tool :- The Apigee trace tool can be used to make simple API GET requests…

How to Perform CRUD operation in Node JS using MS SQL Server

Table of Contents

  • Initialize the project
  • Create SQL Server configuration and connection
  • App router
  • App controller
  • Starting the application
  • Create/Add records
  • Read all records
  • Update data
  • Delete records

Initialize the project

Create the package.json file for your project using below command.

c:\> cd sqlapi-demo
c:\sqlapi-demo> npm init

Then create project structure as give in this picture

CD to root project and run

npm install


Photo by Miguel A. Amutio on Unsplash

Some key insight form history

The word ‘risk’ is thought to derive either from the Arabic word ‘risq’ or the Latin word ‘risicum’.

The Latin word ‘risicum’ originally referred to the challenge presented to seafarers by a barrier reef and so implied a possible negative outcome.

Arabic word ‘risq’ ‘anything that has been given to you (by God) and from which you draw profit’

Good risk management isn’t about not taking any risks: it is about taking the right risks where there is an appropriate reward. It is about protecting assets and adding value.

Let’s Determine our Risk Precedence with…

Photo by National Cancer Institute on Unsplash

Background Image Size in Android

When we think about android resource files we get confused because we have seen lot of devices with different size and resolutions and generally following question comes in mind

What size is required for all devices?

What is image quality requirement?

Should I create separate images for each of screen sizes?

So, Do I have to worry about all these? and answer is not al all.

1. The following are the best dimensions for the app to run in all devices.

xhdpi: 640x960 px
hdpi: 480x800 px
mdpi: 320x480 px
ldpi: 240x320 px

2. What is small, med, large.. for screens?

  • xlarge screens are at least 960dp x 720dp
  • large screens are at least 640dp x 480dp
  • normal screens are at least 470dp x 320dp
  • small screens are at least 426dp x 320dp

3. This article explains screen sizes

To support these devices, refer to the following developer guides:

Some basic interview question for Exception handling.

Java SE 11: Exception Handling

Objective type Question

1. Select the condition that describes a Throwable class of type Error.

a) An exceptional condition that are external to the application

b) A programming error caused by invalid syntax

c) An error for an invalid array index

2. What happens to an exception when it is propagated all the way up the call stack without being handled?

a) The error is ignored and the program terminates

b) The jvm calls System.exit with the error status

c) The jvm outputs the exception and a stack trace for the exception

3. Select the methods used by Java to handle unexpected events.

a) System.exit is called

b) An exception is thrown to the calling method

c) An abnormal terminal occurs

4. What is a checked exception?

a) An exception that the caller is forced to catch or rethrow

b) An exception…

What is EC2?

According to the AWS website, the bouquet of featured services includes the following:

  • Amazon EC2 — Elastic virtual servers in the cloud
  • Amazon Simple Storage Service (S3) — Scalable storage in the cloud
  • Amazon Aurora — High-performance managed relational database
  • Amazon DynamoDB — Managed NoSQL database
  • Amazon RDS — Managed relational database service for MySQL, PostgreSQL,Oracle, SQL Server, and MariaDB
  • AWS Lambda — Run code without thinking about servers
  • Amazon VPC — Isolated cloud resources
  • Amazon Lightsail — Launch and manage virtual private servers
  • Amazon SageMaker — Build, train, and deploy machine learning models at scale

Amazon Elastic Compute Cloud Documentation

Amazon Elastic Compute Cloud…

Marvelous Open Group Architecture Framework On Architecture

Mark Richards is a Boston-based software architect who’s been thinking for more than 30 years about how data should flow through software. His book, Software Architecture Patterns, focuses on five architectures that are commonly used to organize software systems. The best way to plan new programs is to study them and understand their strengths and weaknesses.

1) Layered (n-tier) Architecture

2 ) Event-Driven Architecture

3) Microkernel Architecture

4 ) Microservices Architecture

5 ) Space-Based Architecture

  • Layered (n-tier) Architecture: This approach is probably the most common because it is usually built around the database, and many applications in business naturally lend…

Pragati Singh ⭐️⭐️⭐️⭐️⭐️

Android Developer Advocate & Architect ✔Technology Leader ✔Life Coach #techentrepreneur #polyglot programer #BuildBetterApp

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store