PinnedRamkumar KrishnaninSystem WeaknessContainer Security — Learn with exploiting the weaknessIn our container environment, the moment we started thinking about protecting container with right secure practices then the first buzz…Jan 29, 2022Jan 29, 2022
Ramkumar KrishnanReact Final Form(RFF) – tips to avoid unnecessary re-renderingI am here sharing the some of the best practices which I followed to avoid unnecessary re-rendering and improve the performance of react…Jul 27, 2023Jul 27, 2023
Ramkumar KrishnanBug bounty program experience — Tips and TricksI recently involved in the bug bounty program and sharing here the experiences of working with ethical hackers from hackerone.com…Apr 11, 2023Apr 11, 2023
Ramkumar KrishnanShadowDOM / RootDOM — Calculate the DOM max Depth and WidthAn automated way to find the depth and width of shadowDOM/RootDOMAug 19, 2022Aug 19, 2022
Ramkumar KrishnanNative web components vs Lit element: The key practical differencesTo cope with the faster development of different front-end frameworks. Always there is a clear need that the UI we develop is should be…Apr 24, 2022Apr 24, 2022
Ramkumar KrishnanReact/Redux hooks — Equivalent implementation in Class componentI am writing this article as an attempt to challenge myself to do a deep dive comparison between react/redux hooks used in functional…Feb 1, 2022Feb 1, 2022
Ramkumar KrishnanAngular/React — Public client Single Page Applications — a secure practice on where to store the…Authentication implementation for standalone SPA (without a dedicated backend server, see image below) would always have to go through a…Jan 30, 2022Jan 30, 2022
Ramkumar KrishnanKubernetes NFS encrypted communication: Kubernetes pod applications (as NFS client) and Linux based…As we all know, to encrypt NFS share traffic b/w NFS client and NFS server the couple of options are used in general are Kerberos…Jan 29, 20221Jan 29, 20221
Ramkumar KrishnanAngular custom HTTP interceptor hook to Intercept “HTTP requests in Iframe window” from Parent…As we all know, angular provides a default HTTP Interceptor as part of angular HTTP module. We can use this interceptor to intercept the…Jan 29, 2022Jan 29, 2022
Ramkumar KrishnanUnderstand the Anatomy of how HTTPS works ( Asymmetric, Diffie-hellman, symmetric) : my way of…1 Initial Handshake, Local CA validation and Asymmetric encryption establishmentJan 29, 2022Jan 29, 2022