Apriorit
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author
Web Applications: Common Vulnerabilities and Ways to Eliminate Them
Is your web application secure and free from vulnerabilities? Read this article to learn about common web application vulnerabilities and ways to miti...
Apriorit Featured in Clutch 1000 as a Top .NET Developer
Apriorit .NET development team is recognized by clients and independent analysts for their excellent engineering skills, business-oriented processes...
Analyzing Network Activities with Bro IDS and Intel Critical Stack
This article may be useful for security administrators and DevSecOps who are looking for alternative ways of detecting network intrusions and suspicio...
Typical Web Application Security Issues and Solutions
Get a brief overview of the 3 most widespread web app vulnerabilities: security Misconfiguration; broken session and authentication problems; and Cros...
How to Build Android Application .apk File From the Command Line
In this article, I will describe how to use the Android tools for building the .apk file using the command line
Caching in .NET and SQL Server Notifications
Get a quick overview of various caching methods used in ASP.NET projects with their pros, cons, and implementation tips
Testing JavaScript with Jasmine
Get insights, settings, and ready code pieces to organize testing of JavaScript with Jasmine
Software Research & Development Outsourcing trends for 2016
Analysis of the latest IT outsourcing trends applied to the software R&D services
Classes Restoration – Useful Tips for Software Reverse Engineers
A short intro lesson for software reverse engineers considering classes restoration in Delphi. Learn how to get class methods and arguments.