Martin ThomaMobile Device Management (MDM)Mobile devices are laptops, tablets, and smarphones. The issue with mobile devices is that they get lost if you have enough…Oct 27Oct 27
Martin ThomaNetwork Scanning 😈Assume you are an attacker and you are in the network you want to attack. What is your next step?Sep 14Sep 14
Martin ThomaWhy Story Points are a bad idea for measuring developer productivityPeople want to be good in their jobs and make decisions they can justify. For this reason, data-driven decisions are a wildly popular…Sep 10Sep 10
Martin ThomaOpen Source vs Free SoftwarePeople use “open source” and “free software” as synonyms but are not. All Free Software is open source, but not all open-source software is…Sep 7Sep 7
Martin ThomainFAUN — Developer Community 🐾Brute Force Attacks 😈Just try all options with an exhaustive brute-force searchAug 23Aug 23
Martin ThomaHow to test Requests in Web DevelopmentAs a backend developer, I sometimes have the need to check which requests are sent, including the headers and the payload. It’s enormously…Aug 19Aug 19
Martin ThomainPlain and SimpleWhat is a forward/reverse proxy?A proxy forwards requests. They can filter or change requests.Aug 18Aug 18