Skip to content

Desi banjara

learn and grow together

  • Azure
    • Azure Compute
      • Azure Logic Apps
      • Azure Mobile Apps
      • Azure App Service
      • Azure Serverless Computing
        • Azure Functions
    • Azure Networking services
      • Azure Networking – VNET
    • Azure Database Services
      • Azure SQL
      • Azure Data Factory
      • Azure Databricks
    • Azure Analytics Services
    • Azure Cognitive Services
    • Azure Data and Storage
    • Azure Devops
    • Azure landing zone
    • Azure IaaS
    • Azure Internet of Things (IoT)
      • Azure Machine Learning
      • Azure AI and ML services
    • Azure Migration
    • Microsoft Azure Log Analytics
  • Azure Security
    • Azure Identity and Access Management
    • Azure Active Directory
    • Azure Defender
    • Azure security tools for logging and monitoring
    • Azure Sentinel
    • Azure Sentinel – Data connectors
  • Agile Software development
    • Atlassian Jira
  • Amazon Web Services (AWS)
    • Amazon EC2
    • Amazon ECS
    • AWS Lambda
  • Google
    • Google Cloud Platform (GCP)
    • gmail api
    • Google Ads
    • Google AdSense
    • Google Analytics
    • Google Docs
    • Google Drive
    • Google Maps
    • Google search console
  • Software architecture
    • Service-oriented architecture (SOA)
    • Domain-Driven Design (DDD)
    • Microservices
    • Event-Driven Architecture
    • Command Query Responsibility Segregation (CQRS) Pattern
    • Layered Pattern
    • Model-View-Controller (MVC) Pattern
    • Hexagonal Architecture Pattern
    • Peer-to-Peer (P2P) pattern
    • Pipeline Pattern
  • Enterprise application architecture
  • IT/Software development
    • API development
    • ASP.Net MVC
    • ASP.NET Web API
    • C# development
    • RESTful APIs
  • Cybersecurity
    • Cross Site Scripting (XSS)
    • Reflected XSS
    • DOM-based XSS
    • Stored XSS attacks
    • Ransomware
    • cyber breaches
    • Static Application Security Testing (SAST)
  • Interview questions
    • Microsoft Azure Interview Questions
    • Amazon Web Services (AWS) Interview Questions
    • Agile Software development interview questions
    • C# interview questions with answers
    • Google analytics interview questions with answers
    • Javascript interview questions with answers
    • Python interview questions with answers
    • WordPress developer interview questions and answers
  • Cloud
    • Cloud computing
    • Infrastructure as a Service (IaaS)
    • Platform as a Service (PaaS)
    • Software as a Service (SaaS)
    • Zero Trust strategy
  • Toggle search form
  • HL7 vs FHIR Healthcare Interoperability Resources
  • Azure Compute Services Azure Compute
  • Azure Services – Data and Storage Azure
  • Event-Driven Architecture Event-Driven Architecture
  • Hub and scope networking pattern IT Infrastructure networking
  • Azure Stream Analytics Azure
  • What is DevSecOps? DevOps
  • Azure Cognitive Services Azure Cognitive Services

Category: Cybersecurity

Why cyber breaches are expected to increase?

Posted on March 10, 2023April 6, 2023 By DesiBanjara No Comments on Why cyber breaches are expected to increase?

In recent years, cyber breaches have become a major concern for organizations of all sizes and industries. With the increasing reliance on technology, the threat landscape has become more complex, and cyber attackers are finding new ways to exploit vulnerabilities. Greater reliance on technology One of the primary reasons why cyber breaches are expected to…

Read More “Why cyber breaches are expected to increase?” »

cyber breaches, Cybersecurity

Ransomware – preventative measures, detection, and recovery

Posted on March 8, 2023 By DesiBanjara No Comments on Ransomware – preventative measures, detection, and recovery

Ransomware attacks have become a major threat to businesses and organisations worldwide. Ransomware is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key. These attacks have become increasingly common, and the costs associated with them can be significant. To protect against ransomware, it’s important to have…

Read More “Ransomware – preventative measures, detection, and recovery” »

Ransomware

DOM-based XSS

Posted on March 8, 2023 By DesiBanjara No Comments on DOM-based XSS

DOM-based XSS, also known as type-0 XSS or client-side XSS, is a type of cross-site scripting attack that occurs when the attacker can manipulate the DOM (Document Object Model) of a web page to inject and execute malicious code. Unlike Reflected XSS and Stored XSS, the attack payload is not sent to the server but…

Read More “DOM-based XSS” »

Cybersecurity, DOM-based XSS

Reflected XSS

Posted on March 8, 2023 By DesiBanjara No Comments on Reflected XSS

Reflected XSS, also known as non-persistent XSS, occurs when an attacker injects malicious code into a website and then tricks the victim into clicking on a specially crafted link that contains the injected code. When the victim clicks on the link, the malicious code is executed in the victim’s browser, allowing the attacker to steal…

Read More “Reflected XSS” »

Reflected XSS

What is Stored XSS?

Posted on March 8, 2023March 8, 2023 By DesiBanjara No Comments on What is Stored XSS?

Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious code into a web application. There are different types of XSS attacks, including Reflected XSS, DOM-based XSS, and Stored XSS. In this article, we will focus on Stored XSS and provide examples of how it works. What is Stored XSS?…

Read More “What is Stored XSS?” »

Stored XSS attacks

Cross Site Scripting (XSS)

Posted on March 8, 2023March 8, 2023 By DesiBanjara No Comments on Cross Site Scripting (XSS)

Cross-site scripting (XSS) is a common vulnerability that affects web applications. It is caused by the injection of malicious scripts into a web page viewed by unsuspecting users. These scripts can be used to steal sensitive data, control the victim’s browser, or perform other nefarious actions. In this article, we will explore the different types…

Read More “Cross Site Scripting (XSS)” »

Cross Site Scripting (XSS), Cybersecurity

What is Cyber Security? Definition, Challenges & Best Practices

Posted on March 2, 2023March 3, 2023 By DesiBanjara No Comments on What is Cyber Security? Definition, Challenges & Best Practices

What is Cyber Security? Definition, Challenges & Best Practices Cyber security is a term used to describe the practices, technologies, and processes that are used to protect computer systems, networks, and data from unauthorised access, theft, or damage. Cyber security has become an increasingly important issue in recent years as more and more organisations rely…

Read More “What is Cyber Security? Definition, Challenges & Best Practices” »

Cybersecurity



Categories

  • Agile Software development
  • AI Writing & Automation
  • Amazon AWS Certification Exam
  • Amazon EC2
  • Amazon ECS
  • Amazon Web Services (AWS)
  • Apache Kafka
  • API development
  • API development
  • Apple Mac
  • Applications of Graph Theory
  • ARM templates
  • Artificial intelligence
  • ASP.NET Core
  • ASP.Net MVC
  • ASP.NET Web API
  • Atlassian Jira
  • Availability zones
  • AWS DevOps Engineer Professional Exam
  • AWS Lambda
  • AZ-300: Microsoft Azure Architect Technologies Exam
  • Azure
  • Azure Active Directory
  • Azure AD B2C
  • Azure AD Domain Services
  • Azure AI and ML services
  • Azure Analytics Services
  • Azure App Service
  • Azure Application Gateway
  • Azure Archive Storage
  • Azure Blob Storage
  • Azure Cache for Redis
  • Azure Cognitive Services
  • Azure Compute
  • Azure Container Instances (ACI)
  • Azure Core Services
  • Azure Cosmos DB
  • Azure Data and Storage
  • Azure Data Factory
  • Azure Data Lake Storage
  • Azure Database for MySQL
  • Azure Database for PostgreSQL
  • Azure Database Migration Service
  • Azure Database Services
  • Azure Databricks
  • Azure DDoS Protection
  • Azure Defender
  • Azure Devops
  • Azure Disk Storage
  • Azure ExpressRoute
  • Azure File Storage
  • Azure Firewall
  • Azure Functions
  • Azure HDInsight
  • Azure IaaS
  • Azure Identity and Access Management
  • Azure instance metadata service
  • Azure Internet of Things (IoT)
  • Azure Key Vault
  • Azure Kubernetes Service (AKS)
  • Azure landing zone
  • Azure Lighthouse
  • Azure Load Balancer
  • Azure Logic Apps
  • Azure Machine Learning
  • Azure Machine Learning
  • Azure Migration
  • Azure Mobile Apps
  • Azure Network Watcher
  • Azure Networking – VNET
  • Azure Networking services
  • Azure Pricing and Support
  • Azure Pricing Calculator
  • Azure Queue Storage
  • Azure regions
  • Azure Resource Manager
  • Azure Security
  • Azure Security Center
  • Azure Security Information and Event Management (SIEM)
  • Azure security tools for logging and monitoring
  • Azure Security, Privacy, Compliance, and Trust
  • Azure Sentinel
  • Azure Sentinel – Data connectors
  • Azure Serverless Computing
  • Azure Service Level Agreement (SLA)
  • Azure SLA calculation
  • Azure SQL
  • Azure SQL Database
  • Azure Storage
  • Azure Stream Analytics
  • Azure Synapse Analytics
  • Azure Table Storage
  • Azure Virtual Machine
  • Azure VNET
  • Azure VPN Gateway
  • Blogging
  • Business
  • C# development
  • C# interview questions with answers
  • Career success
  • CDA (Clinical Document Architecture)
  • ChatGPT
  • CI/CD pipeline
  • CISSP certification
  • CKEditor
  • Cloud
  • Cloud computing
  • Cloud Computing Concepts
  • Cloud FinOps
  • Cloud FinOps Optmisation
  • Cloud services
  • COBIT
  • Command Query Responsibility Segregation (CQRS) Pattern
  • Configure SSL offloading
  • Content Creation
  • Content management system
  • Continuous Integration
  • conversational AI
  • Cross Site Scripting (XSS)
  • cyber breaches
  • Cybersecurity
  • Data Analysis
  • Data Clean Rooms
  • Data Engineering
  • Data Warehouse
  • Database
  • DeepSeek AI
  • DevOps
  • DevSecOps
  • Docker
  • DOM-based XSS
  • Domain-Driven Design (DDD)
  • Dynamic Application Security Testing (DAST)
  • Enterprise application architecture
  • Event-Driven Architecture
  • GIT
  • git
  • gmail api
  • Google
  • Google Ads
  • Google AdSense
  • Google Analytics
  • Google analytics interview questions with answers
  • Google Cloud Platform (GCP)
  • Google Docs
  • Google Drive
  • Google Flights API
  • Google Maps
  • Google search console
  • Graph Algorithms
  • Graph theory
  • Healthcare Interoperability Resources
  • Hexagonal Architecture Pattern
  • HL7 vs FHIR
  • HTML
  • IBM qradar
  • Information security
  • Infrastructure as a Service (IaaS)
  • Internet of Things (IoT)
  • Interview questions
  • Introduction to DICOM
  • Introduction to FHIR
  • Introduction to Graph Theory
  • Introduction to HL7
  • IT governance
  • IT Infrastructure networking
  • IT/Software development
  • Javascript interview questions with answers
  • Kubernetes
  • Layered Pattern
  • Leadership
  • Leadership Quote
  • Life lessons
  • Load Balancing Algorithms
  • Low-code development platform
  • Management
  • Microservices
  • Microservices
  • Microsoft
  • Microsoft 365 Defender
  • Microsoft AI-900 Certification Exam
  • Microsoft AZ-104 Certification Exam
  • Microsoft AZ-204 Certification Exam
  • Microsoft AZ-900 Certification Exam
  • Microsoft Azure
  • Microsoft Azure certifications
  • Microsoft Azure Log Analytics
  • Microsoft Cloud Adoption Framework
  • Microsoft Exam AZ-220
  • Microsoft Exam AZ-400
  • Microsoft Excel
  • Microsoft Office
  • Microsoft Teams
  • Microsoft Teams
  • Microsoft word
  • Model-View-Controller (MVC) Pattern
  • Monitoring and analytics
  • NoSQL
  • OpenAI
  • OutSystems
  • Peer-to-Peer (P2P) pattern
  • Personal Growth
  • Pipeline Pattern
  • PL-100: Microsoft Power Platform App Maker
  • PL-200: Microsoft Power Platform Functional Consultant Certification
  • PL-900: Microsoft Power Platform Fundamentals
  • Platform as a Service (PaaS)
  • Postman
  • Project management
  • Python interview questions with answers
  • Rally software
  • Ransomware
  • Reflected XSS
  • RESTful APIs
  • Rich Text Editor
  • SC-100: Microsoft Cybersecurity Architect
  • Scrum Master Certification
  • Service-oriented architecture (SOA)
  • SIEM
  • Software architecture
  • Software as a Service (SaaS)
  • SonarQube
  • Splunk
  • SQL
  • SQL Azure Table
  • SQL Server
  • Startup
  • Static Application Security Testing (SAST)
  • Stored XSS attacks
  • System Design Interview
  • Table Storage
  • Test Driven Development (TDD)
  • TinyMCE
  • Top technology trends for 2023
  • Types of Graphs
  • Uncategorized
  • User Experience (UX) design
  • Version control system
  • virtual machine scale set
  • visual studio
  • WCF (Windows Communication Foundation)
  • Web development
  • Windows Hello
  • WordPress
  • WordPress developer interview questions and answers
  • Yammer
  • Zero Trust strategy



Recent Posts

  • Ace Your FAANG System Design Interview like Google & Amazon: The 8 Whitepapers You Must Read
  • From $0 to $10K/Month Writing Online – The Exact Roadmap to Build a Profitable Writing Career
  • How to Write an AI-Generated Article That Feels 100% Human Using ChatGPT
  • DeepSeek AI: The OpenAI Rival You Didn’t See Coming (But Should)
  • 10 Ways AI is Revolutionizing Healthcare (And Why Your Doctor Might Just Be a Robot Soon)
  • Amazon ECS Amazon ECS
  • Azure Service Level Agreement (SLA) Azure
  • Azure Application Gateway Azure
  • Azure Container Instances (ACI) Azure Container Instances (ACI)
  • Unveiling the Art of FinOps: Evaluating Cost Efficiency in Cloud Architectures Cloud
  • Azure Artificial Intelligence (AI) and Machine Learning (ML) services Azure
  • HL7 vs FHIR Healthcare Interoperability Resources
  • Sample Exam Questions 4: AZ-300: Microsoft Azure Architect Technologies AZ-300: Microsoft Azure Architect Technologies Exam

Copyright © 2025 Desi banjara.

Powered by PressBook News WordPress theme