Posted in: Uncategorized

Get a URL Parameter from a client Request

Often it’s important to read off the parameters sent through from the request. If it’s a GET request these will lie within the url itself and can be read using the request’s URL property. It’s important to note that when getting the parameters in this way it will always return an array (or slice?). Our […]

Posted in: Uncategorized

Go Lang

gofmt برای فرمت بندی کردن برنامه های گو استفاده میشه Gofmt formats Go programs. It uses tabs for indentation and blanks for alignment. Alignment assumes that an editor is using a fixed-width font. Without an explicit path, it processes the standard input. Given a file, it operates on that file; given a directory, it operates […]

Posted in: Programming

The Twelve-Factor App methodology

The twelve factors The Twelve-Factor App methodology is a methodology for building software-as-a-service applications. These best practices are designed to enable applications to be built with portability and resilience when deployed to the web. To effectively design and build apps for the cloud, you should understand the twelve factors: I. Codebase: One codebase tracked in […]

Posted in: Cloud Computing

Aviatrix Certified Engineer- Multi Cloud Exam

Recently, I sat for the Aviatrix Certified Engineer exam and Passed it. Here’s my experience about the whole process, importance of the exam, and my personal notes that I took while prepping for the exam. About Aviatrix Aviatrix is a cloud native networking company. Aviatrix cloud-native networking solution provides an end to end secure network […]

Posted in: Network, PenTest

A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Penetration testing & Haking Tools list that covers Performing Penetration testing Operation in all the Environment. Penetration testing and ethical hacking tools are very essential part for every organization to […]

Posted in: Network, OSI Model, Uncategorized

Ping and ICMP Error Messages

Ping is a network tool mainly used to test whether a host is reachable across an IP network and to measure the round-trip time for packets sent from source to the destination computer. Ping works by sending Internet Control Message Protocol (ICMP) echo request packets to the destination host and waits for an ICMP response. […]