Sanitizing Input Vulnerabilities : A Clean and Effective ApproachEnsuring user input security is critical in the quickly changing world of web application development. We recently took action in response…Jun 22Jun 22
Autorization : Simple waysTo safeguard critical data and capabilities in a Spring Boot application, appropriate permission techniques are necessary. Here we will…May 16May 16
K8s HELM ChartsHELM is a powerful package manager for Kubernetes, designed to simplify the deployment and management of applications. In the complex…Jan 25Jan 25
Accessing third party cookies in Iframe: Cross-Domain Communication(CORS)In the ever-evolving landscape of web development, building applications that span across different domains is not uncommon.Dec 20, 2023Dec 20, 2023
Springboot 101 : Auto ConfigurationWhen it comes to Java development, convention and simplicity are greatly prized over configuration. Let me introduce you to Spring Boot, a…Dec 18, 2023Dec 18, 2023
Chain Response in multiple APIs in PostmanPostman, a popular API development and testing tool, offers a powerful scripting environment that allows users to automate tests and…Dec 11, 20231Dec 11, 20231
Reactive Tools : Map , FlatMap, FlatMapMany, SubscribeReactive programming has grown in popularity in recent years, offering a strong method for dealing with asynchronous and event-driven…Dec 8, 2023Dec 8, 2023
Understanding @ControllerAdvice in JavaThe @ControllerAdvice annotation in Java is a helpful tool for handling errors universally across Spring MVC applications. This annotation…Dec 1, 2023Dec 1, 2023
Book Summary : Stolen Focus: Why You Can’t Pay AttentionWith “Stolen Focus: Why You Can’t Pay Attention,” Lucy Jo Palladino examines the causes of our modern-day struggles with focusing and…Nov 19, 2023Nov 19, 2023
Handling Legacy Code: Dumb ways to dieHandling legacy code can be a challenging task for any software developer. Legacy code is the code that was written a long time ago and has…Nov 5, 2023Nov 5, 2023