Building a PWA vuejs app with wordpress API – Part 1
Building a PWA vuejs app with wordpress API - Part 1 The aim in this is to make an offline-first PWA with vuejs / axios / bootstrap using wordpress as…
Building a PWA vuejs app with wordpress API - Part 1 The aim in this is to make an offline-first PWA with vuejs / axios / bootstrap using wordpress as…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…
Metasploit for website pentest using wmap. This is a short tutorial on using the wmap module inside metasploit. Wmap is a web application scanner that runs within metasploit. We can…
Metasploitable background: What is metasploitable? "Metasploitable is a Virtual Machine that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used…
service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…
Making a WordPress Theme. From Scratch. Research + Information Architecture Introduction Making a new WordPress theme from scratch can seem daunting, but it's pretty easy if you know the steps.…
build your own blockchain application in less than an hour Edward Ciggaar developer advocate IBM I've been looking forward to this one for a while now :D starting with an…
This is a short post on how to setup a dvwa vagrant box for your testing. I recommend this method when installing and testing new tools (and even for developing…