CloudFormation Mappings in a NutShell
CloudFormation Pseudo Parameters Explained
Ambiguity effect
SurvivorShip Bias: background and examples
Fighter aircrafts returning after missions during World War II are often cited as an early and well-known example of survivorship bias. The military planned to fortify the plane by installing armour there. Armour, however, would be too heavy to be placed everywhere.
Create User using Laravel Tinker
Tinker is a Laravel intractive command line shell and scripting interface. Tinker core includes many helpful commands and generators; we’ll utilise Tinker to create a user in Laravel.
Work with PMD for Apex in VS code
In this article, we’ll go over installing PMD and the PMD plugin for visual studio code, as well as adding some custom rulesets and finaly addressing some common issues.
Add alias permanently to MacOS
Man in the middle attack in brief
A man-in-the-middle attack refers to a type of cyber attack where an unauthorised third party intercepts a communication channel that is perceived to be secure by the two legitimate parties involved in the communication.
How HTTPs works
HTTPS runs on transport layer of TLS on port 443. The predecessor of TLS was SSL, which deprecated.
- TLS handshake issued by the client, let’s call the message ‘chello’ for simplicity.