Skip to content
Merged

Develop #2156

Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
The diff you're trying to view is too large. We only load the first 3000 changed files.
4 changes: 2 additions & 2 deletions GUIDELINES.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Here are the guidelines that you shall follow for formatting and submitting your
- **title:** A meaningful title. Max. 60 characters.
Note: This title will appear in the post, so no need to again include it in the `.md` file.
- **date:** A date shall be in `YYYY-MM-DD` format. And the date shall not be greater than the current date.
- **coverImage:** The name of the image with format shall come here. For example, `coverimage.png`. Make sure that the image is present in the same directory as your `index.md`.
- **coverImage:** The name of the image with format shall come here. For example, `coverimage.webp`. Make sure that the image is present in the same directory as your `index.md`.
- **author:** The name of the author. Make sure that it matches what you would add in the `/content/author.yaml` file.
- **tags:** Add up to 3 relevant tags as an array of string `for eg: ["NodeJs"]`.
- **description:** Add a short description about your blog post, which will appear in the card of your blog. It shall not be more than 160 characters.
Expand All @@ -64,7 +64,7 @@ Here are the guidelines that you shall follow for formatting and submitting your
---
title: "Hello, this is a title"
date: "2020-06-11"
coverImage: "coverImage.png"
coverImage: "coverImage.webp"
author: "Jon Doe"
tags: ["Example1", "Example2", "Example3"]
description: "This is a blog about so and so on. Read this to learn this and this"
Expand Down
Binary file added content/assets/Industry.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/assets/Rakesh.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/assets/Rakesh2.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed content/assets/book-a-demo-loginradius.png
Binary file not shown.
Binary file added content/assets/book-a-demo-loginradius.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed content/assets/contribute_lr.jpg
Binary file not shown.
Binary file added content/assets/contribute_lr.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed content/assets/default-blog.jpg
Binary file not shown.
Binary file added content/assets/default-blog.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed content/assets/freetrial.png
Binary file not shown.
Binary file added content/assets/freetrial.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/assets/github.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/assets/image.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/assets/linkedin.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed content/assets/lr-icon.png
Binary file not shown.
Binary file added content/assets/lr-icon.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/assets/profile.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/assets/x.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
4 changes: 2 additions & 2 deletions content/author.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -651,7 +651,7 @@
linkedin: "oyesoni"
twitter: "OyeSoni"
github: "oyesoni"
avatar: "rakesh-soni.jpg"
avatar: "rakesh-soni.webp"

- id: Deependra Singh
bio: Deependra Singh - over 10+ years experience as a digital marketer and currently working and specializes in Search Engine Optimization for LoginRadius. Additionally, he has experience in digital marketing strategy, SEO techniques, strategic planning, lead generation program, execution, and promotions.
Expand Down Expand Up @@ -864,7 +864,7 @@
- id: Ajoy Anand
bio: Ajoy Anand is the Chief Operating Officer of LoginRadius. He is responsible for overseeing LoginRadius’ day-to-day operations, working with employees, partners, and customers to deliver on the company’s vision.
linkedin: "ajoy-anand-33073a29"
avatar: "ajoy-anand.jpg"
avatar: "ajoy-anand.webp"

- id: Jaqueline Kispert
bio: Jaqueline Kispert is a Content Writer at <a href="https://www.dataguard.co.uk/">DataGuard</a>. She aims to translate complex information into easily understandable content, making knowledge about information security and compliance accessible to everyone.
Expand Down
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Diff not rendered.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "Javascript tips and tricks to Optimize Performance"
date: "2017-04-07"
coverImage: "16-JavaScript-Hacks-to-save-time-and-boost-productivity-768x555.png"
coverImage: "16-JavaScript-Hacks-to-save-time-and-boost-productivity-768x555.webp"
author: "Team LoginRadius"
tags: ["Engineering","JavaScript","Hacks","Array"]
description: "Learn how to optimize performance using some useful javascript hacks, tips and tricks."
Expand Down Expand Up @@ -48,11 +48,11 @@ console.log(string.replace(/in/g, "out")); //"logout logout"

With the help of **breakpoints** or **debugging points** you can set multiple barriers to rectify source of error at every barrier.

![Use breakpoints and Console for Debugging](Use-breakpoints-and-Console-for-Debugging-1.jpg)
![Use breakpoints and Console for Debugging](Use-breakpoints-and-Console-for-Debugging-1.webp)

Press F11 for next call function and f8 to resume script execution.

![Use breakpoints and Console for Debugging](Use-breakpoints-and-Console-for-Debugging-2.jpg)
![Use breakpoints and Console for Debugging](Use-breakpoints-and-Console-for-Debugging-2.webp)

You can also check what dynamic values are generated by a function, using console and can check output on different values.

Expand Down Expand Up @@ -225,11 +225,11 @@ For beautifying your Javascript  code use [jsbeautifier](http://jsbeautifier.or

**Code before Beautifying**

![Beautifying JS code 1](Beautifying-JS-code-2.jpg)
![Beautifying JS code 1](Beautifying-JS-code-2.webp)

**Code after Beautifying**

![Beautifying JS code 2](Beautifying-JS-code-1.jpg)
![Beautifying JS code 2](Beautifying-JS-code-1.webp)



Expand Down
Diff not rendered.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "3 Simple Ways to Secure Your Websites/Applications"
date: "2019-06-24"
coverImage: "hacker.png"
coverImage: "hacker.webp"
author: "Karl Wittig"
tags: ["Engineering"]
---
Expand Down
Diff not rendered.
2 changes: 1 addition & 1 deletion content/engineering/AI-and-IoT-The-Perfect-Match/index.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "IoT and AI - The Perfect Match"
date: "2020-10-28"
coverImage: "cover.jpg"
coverImage: "cover.webp"
author: Devansh Agarwal
tags: ["AI", "IOT"]
description: "AI and IOT are very popular these days. Let's understand Why IoT and AI together make the perfect match!"
Expand Down
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Binary file removed content/engineering/Best-hacking-tools/burpsuite.png
Diff not rendered.
Binary file removed content/engineering/Best-hacking-tools/cover1.jpg
Diff not rendered.
16 changes: 8 additions & 8 deletions content/engineering/Best-hacking-tools/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

title: Best Hacking Tools
date: "2020-10-22"
coverImage: "cover1.jpg"
coverImage: "cover1.webp"
author: "Akshay Nagle"
description: Learn about the basic hacking tools.
tags: ["Ethical Hacking", "Security", "Testing"]
Expand All @@ -12,7 +12,7 @@ Ever since you enter the sphere of ethical Hacking, you usually need to get your


### 1.) Nmap
![](nmap.jpg)
![](nmap.webp)


It is a free and open-source tool that's used for network discovery and security auditing.
Expand All @@ -38,7 +38,7 @@ It uses raw IP packets to determine


### 2.) Metasploit
![](metasploit_logo.png)
![](metasploit_logo.webp)


It is essentially a Security Assessment and Penetration Testing tool. Metasploit is often used to launch an attack on alternative systems with it.
Expand All @@ -56,7 +56,7 @@ Metasploit may enforce as follows:


### 3.) Wireshark
![](Wireshark_Logo.png)
![](Wireshark_Logo.webp)


It is an open-source tool that's used to capture traffic on the network. It's essentially a network protocol analyzer tool.
Expand All @@ -76,7 +76,7 @@ It additionally captures HTTP packet transmission over the network. Click on "Fo


### 4.) John the Ripper
![](John-The-Ripper.png)
![](John-The-Ripper.webp)


JTR is free and open-source software that's wide employed by hackers for password cracking. It uses the varied cryptanalytics attacks like "Dictionary Attack" and "Brute-Force Attack".
Expand All @@ -96,7 +96,7 @@ The rate at which the password is going to be cracked depends utterly on the pas


### 5.) Burp Suite
![](burpsuite.png)
![](burpsuite.webp)


It is an integrated platform that's used for activity a check on net application security.
Expand All @@ -118,7 +118,7 @@ Burp Suite features:


### 6.) Angry IP Scanner
![](angryipscanner.jpg)
![](angryipscanner.webp)


It is one of the quickest IP addresses and port scanner. By exploitation, this hacker will gather data concerning open ports within the target system.
Expand All @@ -136,7 +136,7 @@ Features:


### 7.) Nikto
![](NIKTO-Scanner.png)
![](NIKTO-Scanner.webp)


It is a web-server assessment tool. It is an open-source platform that performs tests against web servers to seek multiple vulnerable files, misconfigurations, out-of-date servers, and programs on its web server.
Expand Down
Diff not rendered.
Binary file removed content/engineering/Best-hacking-tools/nmap.jpg
Diff not rendered.
Binary file added content/engineering/Best-hacking-tools/nmap.webp
Diff not rendered.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: " Full data science pipeline implementation"
date: "2020-10-09"
coverImage: "ds.jpg"
coverImage: "ds.webp"
author: "Rinki Nag"
tags: ["DataScience","Python","Web scraping","NLP","Machine learning"]
description: "Learn how to implement the full data science pipeline right from collecting the data to implementing ML algorithms."
Expand Down
Diff not rendered.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title : "Introduction to UniFi Ubiquiti Network"
date: "2021-03-15"
coverImage: "cover.png"
coverImage: "cover.webp"
author: "Roshan Jangid"
tags: ["Network", "Unifi Networking", Remote Team Management, Startups Solutions]
description: "Getting started with Unifi Network for getting the freedom of remote management of network devices. Here's what you need to know about UniFi network."
Expand All @@ -13,7 +13,7 @@ UniFi is a community of wireless access points, switches, routers, controller de

## Common Network Architecture

![networkdiagram](networkdiagram.png)
![networkdiagram](networkdiagram.webp)

## Benefits of Ubiquiti UniFi Network
1. **Easy Deployment**
Expand Down
Diff not rendered.
Diff not rendered.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: Virtual Dispersive Networking
date: "2020-10-07"
coverImage: "MIM.jpg"
coverImage: "MIM.webp"
author: "Binay Agarwal"
tags: ["VDN", "Cyber Security"]
description: "Learn About VDN for CyberSecurity"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "NodeJS and MongoDB application authentication by JWT"
date: "2020-03-20"
coverImage: "jwt.png"
coverImage: "jwt.webp"
author: "Ashish Sharma"
tags: ["NodeJs", "JWT","MongoDB","Authentication", "JSON Web Token"]
---
Expand Down Expand Up @@ -275,11 +275,11 @@ npm start

Step 10. Open Postman and create a post request to **localhost:3000/auth/register** as below:

![Postman register](register.png "")
![Postman register](register.webp "")

Step 11. After this, let’s sign with this URL **localhost:3000/auth/sign_in** . Enter the keys and values for email and password

![Postman signin](signIn.png "")
![Postman signin](signIn.webp "")



Expand All @@ -292,7 +292,7 @@ JWT eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJlbWFpbCI6Im9sYXR1bmRlZ2FydWJhQGdtYWl
Step 11. Then, enter the parameters for the key and value for fetching the profile. You want to create as shown below and send:


![Postman signin](profile.png "")
![Postman signin](profile.webp "")



Expand Down
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
6 changes: 3 additions & 3 deletions content/engineering/Optimal-Clusters-KMeans/index.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: Optimal clusters for KMeans Algorithm
date: "2020-10-12"
coverImage: "cover.jpg"
coverImage: "cover.webp"
author: "Neeraj Ap"
tags: ["Machine Learning"]
---
Expand Down Expand Up @@ -38,7 +38,7 @@ We've got only two variables, x and y coordinates.

Now, if we run the K means clustering algorithm on this dataset with three clusters or with K pre-determine the clusters to be three, then the result will look something like this.

![initial](initial.png)
![initial](initial.webp)


We need a specific metric, we need a way to understand or evaluate how a certain number of clusters performs compared to a different number of clusters, and preferably, that metric should be quantifiable.
Expand All @@ -47,7 +47,7 @@ So what kind of metric can we impose upon our clustering algorithm that will tel
There is such a metric called the within-cluster sum of squares. (WCSS)


![Wcss](Wcss.png )
![Wcss](Wcss.webp )


So you can see here that it jumps from 8000 down to 3000, that's a massive change of 5000. Let's just call them units, 5000 units and then from 3000 as we increase the number of the close from 2 to 3, they jump from 3000 to 1000.
Expand Down
Diff not rendered.
Diff not rendered.
Diff not rendered.
4 changes: 2 additions & 2 deletions content/engineering/Secure-Enclave-iOS-app/index.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "Secure Enclave in iOS App"
date: "2020-10-13"
coverImage: "CoverImage.jpg"
coverImage: "CoverImage.webp"
author: "Tanvi Jain"
description: "SecureEnclaveDemo is an xcode project containing helper named as SecEnclaveWrapper. You can use this wrapper in your project to encrypt/decrypt sensitive data using Secure Enclave. Let's understand more about in the blog."
tags: ["ios","security","data","encryption","private key","xcode"]
Expand All @@ -14,7 +14,7 @@ The Secure Enclave is a hardware-based key manager that’s isolated from the ma
We usually save data persistently in the app using UserDefaults, Keychain, Core Data or SQLite.
For example, To save the session of logged in user, we save username and password. But this process puts our data at high-security risk. So it's always recommended to store sensitive data in an encrypted format. But again, it's a challenge to secure keys used in encryption/decryption.

![Secure Enclave](image2.jpg)
![Secure Enclave](image2.webp)

Now here **Secure Enclave** comes in the role.

Expand Down
Diff not rendered.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "What is Adaptive Authentication or Risk-based Authentication?"
date: "2021-03-09"
coverImage: "adaptive-authentication.jpg"
coverImage: "adaptive-authentication.webp"
author: "Jitender Agarwal"
tags: ["Adaptive Authentication", "Risk-based Authentication"]
description: "Adaptive Authentication intelligently identifies malicious attempt based on the defined risk factors and prompt the consumers to complete an additional step to verify their identities"
Expand Down
Diff not rendered.
4 changes: 2 additions & 2 deletions content/engineering/a-bot-protection-overview/index.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "A Bot Protection Overview"
date: "2019-05-31"
coverImage: "Productshot.jpg"
coverImage: "Productshot.webp"
author: "Chris Yee"
tags: ["Engineering","Captcha","Spam","Secure","IP"]
---
Expand All @@ -14,7 +14,7 @@ One of the most popular methods of bot protection that is used today is CAPTCHA,

An example of a ReCAPTCHA with distorted text

![](https://media-s3-us-east-1.ceros.com/editorial-content/images/2018/05/31/c5c224dc0fb2a058625073c470d70c3c/recaptcha-big.png?ver=1552286291?imageOpt=1&fit=bounds&width=1077)
![](https://media-s3-us-east-1.ceros.com/editorial-content/images/2018/05/31/c5c224dc0fb2a058625073c470d70c3c/recaptcha-big.webp?ver=1552286291?imageOpt=1&fit=bounds&width=1077)

To implement CAPTCHA using Google’s ReCAPTCHA solution, you can access [Google reCAPTCHA bot protection](https://www.google.com/recaptcha/) and login with your Google account. Following that you will be redirected to an interface where you can register your site. Different types of CAPTCHAs can be set up for different events on your domain and can be built to match your use case.

Expand Down
Diff not rendered.
16 changes: 8 additions & 8 deletions content/engineering/a-journey-from-node-to-golang/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: "A journey from Node to GoLang"
date: "2020-08-11"
author: "Narendra Pareek"
coverImage: "node-go.png"
coverImage: "node-go.webp"
tags: ["NodeJs", "Golang", "Performance"]
description: "If your existing technology is not fulfilling all your needs and you are thinking about switching to the new one. Also, if you are concerned about the performance. Here is the blog that can help you in this direction."
---
Expand Down Expand Up @@ -38,44 +38,44 @@ On the basis of our research, we also did some benchmarking on different node js

**Benchmarking sever** we’ve used with below configurations

![server](server.png)
![server](server.webp)


**The benchmarking result** was pretty much similor to what we are thinking. Here are the benchmarking results -

#### 100000 Requests 5000 Concurrency

![sheet1](sheet1.png)
![sheet1](sheet1.webp)



#### 100000 Requests 7500 Concurrency

![sheet2](sheet2.png)
![sheet2](sheet2.webp)

There was a big difference. For better clarity let’s see the below graphs.

### Total Time taken for Test(s)

In the below chart, we can clearly see that Golang won the competition and Hapi has taken the maximum time to finish the test.

![total-time-taken-for-test](total-time-taken-for-test.png)
![total-time-taken-for-test](total-time-taken-for-test.webp)


### Request per second (s) and Transfer Rate kb/s

In the below chart, we can see that Golang served maximum requests per second.

![request-per-second-and-transfer-rate-kb-s](request-per-second-and-transfer-rate-kb-s.png)
![request-per-second-and-transfer-rate-kb-s](request-per-second-and-transfer-rate-kb-s.webp)

### Request per second (s) and Time per request (ms)

The below chart is showing that the Number of requests is very high compared to other node js frameworks.

![request-per-second-and-time-per-request](request-per-second-and-time-per-request.png)
![request-per-second-and-time-per-request](request-per-second-and-time-per-request.webp)

### Total Data Transferred

![chart](chart.png)
![chart](chart.webp)

All the data clearly shows the direction so we decided to move to GoLang.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/AWS_API.png
Diff not rendered.
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/AWS_EC.png
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/AWS_EC21.png
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/AWS_EC22.png
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/AWS_EC23.png
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/AWS_Lex.png
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/AWS_LexV.png
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/AWS_RDS.png
Diff not rendered.
Binary file removed content/engineering/a-journey-with-AWS/aws.png
Diff not rendered.
Binary file added content/engineering/a-journey-with-AWS/aws.webp
Loading