Often it’s important to read off the parameters sent through from the request. If it’s a GET request these will lie within the url itself and can be read using the request’s URL property. It’s important to note that when getting the parameters in this way it will always return an array (or slice?). Our […]
Author: Abolfazl
Go Lang
gofmt برای فرمت بندی کردن برنامه های گو استفاده میشه Gofmt formats Go programs. It uses tabs for indentation and blanks for alignment. Alignment assumes that an editor is using a fixed-width font. Without an explicit path, it processes the standard input. Given a file, it operates on that file; given a directory, it operates […]
The Twelve-Factor App methodology
The twelve factors The Twelve-Factor App methodology is a methodology for building software-as-a-service applications. These best practices are designed to enable applications to be built with portability and resilience when deployed to the web. To effectively design and build apps for the cloud, you should understand the twelve factors: I. Codebase: One codebase tracked in […]
Aviatrix Certified Engineer- Multi Cloud Exam
Recently, I sat for the Aviatrix Certified Engineer exam and Passed it. Here’s my experience about the whole process, importance of the exam, and my personal notes that I took while prepping for the exam. About Aviatrix Aviatrix is a cloud native networking company. Aviatrix cloud-native networking solution provides an end to end secure network […]
A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals
Penetration testing & Hacking Tools are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Penetration testing & Haking Tools list that covers Performing Penetration testing Operation in all the Environment. Penetration testing and ethical hacking tools are very essential part for every organization to […]
Read More “A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals”
Ping and ICMP Error Messages
Ping is a network tool mainly used to test whether a host is reachable across an IP network and to measure the round-trip time for packets sent from source to the destination computer. Ping works by sending Internet Control Message Protocol (ICMP) echo request packets to the destination host and waits for an ICMP response. […]