Martin ThomaNetwork Scanning 😈Assume you are an attacker and you are in the network you want to attack. What is your next step?Sep 14Sep 14
Martin ThomaWhy Story Points are a bad idea for measuring developer productivityPeople want to be good in their jobs and make decisions they can justify. For this reason, data-driven decisions are a wildly popular…Sep 10Sep 10
Martin ThomaOpen Source vs Free SoftwarePeople use “open source” and “free software” as synonyms but are not. All Free Software is open source, but not all open-source software is…Sep 7Sep 7
Martin ThomainFAUN — Developer Community 🐾Brute Force Attacks 😈Just try all options with an exhaustive brute-force searchAug 23Aug 23
Martin ThomaHow to test Requests in Web DevelopmentAs a backend developer, I sometimes have the need to check which requests are sent, including the headers and the payload. It’s enormously…Aug 19Aug 19
Martin ThomainPlain and SimpleWhat is a forward/reverse proxy?A proxy forwards requests. They can filter or change requests.Aug 18Aug 18
Martin ThomainFAUN — Developer Community 🐾(Sub)domain Takeover 😈Ever wondered what happens when a digital asset slips through the cracks? Picture this: you’ve been renting out a property, but when you…Aug 14Aug 14