Remove Engineer Remove Open Source Remove Software Engineering Remove SQL
article thumbnail

A Comprehensive Guide to Web Application Penetration Testing: Features, Importance, and Tips

Women Entrepreneurs Can

Some of these techniques include: Scanning for open ports and services. SQL injection, Cross-site scripting (XSS), and directory traversal are some of the most prevalent web application flaws that may be exploited. It has protection against SQL injection, cross-site scripting, and other frequent assaults.

Web 52
article thumbnail

Programmer Competency Matrix

www.starling-software.com

Software Engineering. source code version control Folder backups by date VSS and beginning CVS/SVN user Proficient in using CVS and SVN features. Good knowledge of editors, debuggers, IDEs, open source alternatives etc. Reads tech/programming/software engineering blogs and listens to podcasts regularly.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Drupal? or, My retraining in Software Development

Scalable Startup

The So Cal engineering gap? I’ve been able to study the Southern Cal software dev scene as an insider for over 2 years now. Drupal has a worldwide engine of real software discipline. The So Cal Drupal scene is highly regarded and has several free meetings every week to teach advanced software life cycle issues.

article thumbnail

CEO Friday: Why we don’t hire.NET programmers

blog.expensify.com

You need to hear this from someone who has used.Net extensively, and then happily walked away from it to go open source: You are a wanker. And before you say.net is only for windows, checkout https://github.com/mono , it’s not an open source application. It’s an *freaking open source*.net

Java 107
article thumbnail

How to hire a programmer to make your ideas happen

sivers.org

After he got the source code, he needed to make a few changes. I had a look at the source code, and it was chock-full of SQL injection vulnerabilities. Nothing essential that I disagree with you in your post, but when read by other people with minimal software engineering experience, they can have too high expectations.