Security breach nocode

Authentication: know who is who!

A public available website often has no authentication or even so called anonymous access. Well if there are no cookies, all information is public, then indeed. But in most cases the information is not public, and is even often linked...

Authentication mechanism

Authorization: who can DO WHAT?

Having a good understanding and effective implementation of authorization is paramount to have adequate control over your information. We will discuss some key principles, threats and what you can do to prevent these threats to materialize. Knowing who interacts with...

Save restaurant test

Create a restaurant reviewing app with NoCode-X (Part II): Adding images to restaurants

In this series we will learn how to build a restaurant reviewing application using the NoCode-X platform. Our application will allow users to add new restaurants and leave ratings and comments about them. In the first part we created a...

No code https out of the box

Is your web-application is secure…? Today: “Ciphers”

  Yes, it looks good! Yes it works! But many people or developers don’t see the cyber security challenges of web applications. Businesses must be served and the business functionalities need to rock and roll. But cyber resilience is a...

Create a restaurant reviewing app with NoCode-X (Part I): Creating restaurants

In this series we will learn how to build a restaurant reviewing application using the NoCode-X platform. Our application will allow users to add new restaurants and leave ratings and comments about them. In the first part we will create...

Security breach nocode

F5 vulnerability, patch management offered?

A new Security vulnerability in detected in F5.  And yes it is a 9.8/10 meaning trivial to exploit with maximum damage…. In other words all hell is breaking loose. The new F5 RCE vulnerability, CVE-2022-1388, is trivial to exploit. We...