Posts

OAuth 2.0 framework

Image
OAuth Authorization Server and an OAuth Resource Server What is OAuth? OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. OAuth 2.0 - OAuth 2.0 is not backwards compatible with OAuth 1.0. OAuth 2.0 provides specific authorization flows for web applications, desktop applications, mobile phones, and smart devices. The specification and associated RFCs are developed by the IETF OAuth WG the main framework was published in October 2012. There are four types of roles in OAuth, Client Resource Owner(User) Resource Server Authentication Server The OAuth 2.0 framework specifies several grant types for different use cases, as well as a framework for creating new grant types. Authorization Code Grant Type - The Authorization Code grant type is used by confidential and public clients to exchange an author...

CSRF token - Double Submit Cookies Pattern

Image
Cross-site Request Forgery Protection in web applications via  Double Submit Cookies Pattern What is Cross-site Request Forgery Protection(CSRF)? This is a kind of attack and type of a malicious exploit of a website. We also name this attack as the one-click attack or session riding. This forces an end user to execute unwanted actions on a web application in which they're currently authenticated. This attack is mainly focusing on state-changing request, not theft data. As an example, if the user 'A' wants to transfer the 200$ to the bank 'B'.He needs to send a request to the bank 'B' and bank will send the response by authenticating user 'A'.There is an attacker he/she needs to fraud this money form user 'A'.what the attacker can do is he will create a malicious web link and send it to the user by forcing to click that link . while the user clicks the link for the transferring purpose but the thing is attacker was transferring th...

CSRF Token-Synchronizer Token Patterns

Image
Cross-site Request Forgery Protection in web applications via Synchronizer Token Patterns What is Cross-site Request Forgery Protection(CSRF)? This is a kind of attack and type of a malicious exploit of a website. We also name this attack as the one-click attack or session riding. This forces an end user to execute unwanted actions on a web application in which they're currently authenticated. This attack is mainly focusing on state-changing request, not theft data. As an example, if the user 'A' wants to transfer the 200$ to the bank 'B'.He needs to send a request to the bank 'B' and bank will send the response by authenticating user 'A'.There is an attacker he/she needs to fraud this money form user 'A'.what the attacker can do is he will create a malicious web link and send it to the user by forcing to click that link . while the user clicks the link for the transferring purpose but the thing is attacker was transferring the mon...

Internet of Things (Iot)

Image
Internet of Things What is Internet of Things? Simply put, this is the concept of basically connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cellphones, coffee makers, washing machines, headphones, lamps, wearable devices and almost anything else you can think of. This also applies to components of machines, for example a jet engine of an airplane or the drill of an oil rig. As I mentioned, if it has an on and off switch then chances are it can be a part of the IoT. The analyst firm Gartner says that by 2020 there will be over 26 billion connected devices... That's a lot of connections (some even estimate this number to be much higher, over 100 billion). The IoT is a giant network of connected "things" (which also includes people). The relationship will be between people-people, people-things, and things-things. Key Components of IoT? 1. Sensors & Actuators : Inputs/Outputs ...

Cloud Computing

Image
Cloud Computing What is Cloud Computing In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. It goes back to the days of flowcharts and presentations that would represent the gigantic server-farm infrastructure of the Internet as nothing but a puffy, white cumulus cloud, accepting connections and doling out information as it floats. Usage of Cloud Computing 1. Infrastructure as a service (IaaS) and platform as a service (PaaS)   When it comes to IaaS, using an existing infrastructure on a pay-per-use scheme seems to be an obvious choice for companies saving on the cost of investing to acquire, manage and maintain an IT infrastructure. There are also instances where organizations turn to PaaS for the same reasons while also seeking to increase the speed of development on a ready-to-use platform to deploy applications. 2. Priva...

Angular Material

Image
What is AngularJS Material? AngularJS Material is both a UI Component framework and a reference implementation of Google's Material Design Specification. Step 1: Install Angular Material npm install --save @angular/material Step 2: Animations Some Material components depend on the Angular animations module in order to be able to do more advanced transitions. If you want these animations to work in your app, you have to install the @angular/animations module and include the BrowserAnimationsModule in your app. npm install --save @angular/animations import {BrowserAnimationsModule} from '@angular/platform-browser/animations';  @NgModule({  ...  imports: [BrowserAnimationsModule],  ...  })  export class PizzaPartyAppModule { } If you don't want to add another dependency to your project, you can use the NoopAnimationsModule. import {NoopAnimationsModule} from '@angular/platform-browser/animations';  @NgModule({ ...

YouTube Search Algorithm

Image
YouTube Search Algorithm YouTube has the 2nd largest search engine in the world. You want the answer, not billions of videos, so YouTube ranking systems sort through the hundreds of billions of videos in our Search index to give you useful and relevant results in a fraction of a second. These ranking systems are made up of a series of algorithms that analyze what it is you are looking for and what information to return to you. And as YouTube’ve evolved Search to make it more useful, YouTube’ve refined our algorithms to assess your searches and the results in finer detail to make their services work better for you. Here are some of the ways YouTube uses Search algorithms to return useful information from the web Analyzing the search key word Matching search key word Ranking useful videos Considering context Returning the best results Analyzing the search key word                         ...