window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date());gtag('config', 'UA-172638165-1');

Security

Home>Posts>Security
26 02, 2021

GDPR, Cookie-policy, Whatever

By |Categories: How to, Security|

By default, I try not to rant about things. I try to be as truthful and complete as possible. I try to be informed. I try to give sound advice based on the knowledge I have and be open for alternative idea.

Nevertheless, often whatever you do, you encounter something that is so mind-boggling bend you could just say what need to be said and be done.

Being European-based, GDRP is a hot topic. It is so hot that many opinions have formed and it feels like everyone with a legal background seems to have some solution and some problem that is

12 01, 2021

Performance and where it all can go wrong

By |Categories: Best Practices, How to, Security|Tags: , |

Modern web applications come with a complex set of underlying services. When the applications are not performing and the response time to deliver a page is high, the search to track the problem down starts.

In this article, we’ll go through performance on different levels of delivering a web page to the browser and we’ll provide an example of troubleshooting performance issues.

Performance on different levels

Understanding why a web page under-performs is seldom easy. Let’s have a look at what actually happens when things get slow. Understanding the full process of delivering a web

21 12, 2020

Security and obscurity

By |Categories: Best Practices, Security|Tags: , |

It is unfortunate that talking about security is still deemed dangerous. The idea is that if you do not share the information it will be harder to find the security hole. The opposite is true as well. By not talking about how things work, people start assuming. This inevitably leads to many problems and is often the start of many security problems that go undetected.

Let’s have a look at a very concrete example.

Two-factor authentication

Not so long ago, the one and only barrier grant someone access to an application was the typical “user

Go to Top