Ridham Tarpara (@ridhamtarpara) 's Twitter Profile
Ridham Tarpara

@ridhamtarpara

JavaScript | Golang | Information Security | Blockchain | Infrastructure | Personal Growth |
Writing book on JavaScript and Golang for beginners

ID: 710448779

calendar_today12-10-2013 05:59:01

519 Tweet

176 Takipçi

281 Takip Edilen

Ridham Tarpara (@ridhamtarpara) 's Twitter Profile Photo

🔒 Security Practice # 2 Linter Security Rules Use security plugins for linter like eslint-plugin-security or tslint-config-security. It offers security checks and protects your code against known vulnerabilities - like unsafe RegEx or eval() and many more #nodejs #javascript

🔒 Security Practice # 2

Linter Security Rules

Use security plugins for linter like eslint-plugin-security or tslint-config-security. It offers security checks and protects your code against known vulnerabilities - like unsafe RegEx or eval() and many more

#nodejs #javascript
Ridham Tarpara (@ridhamtarpara) 's Twitter Profile Photo

🔒 Security Practice # 4 Automate vulnerability dependency scans Use tools like Snyk or npm audit. As we depend on third-party packages for every other task, our applications are vulnerable to any security issues introduced in those packages. #nodejs #security

🔒 Security Practice # 4

Automate vulnerability dependency scans

Use tools like <a href="/snyksec/">Snyk</a> or npm audit. As we depend on third-party packages for every other task, our applications are vulnerable to any security issues introduced in those packages.

#nodejs #security
Ridham Tarpara (@ridhamtarpara) 's Twitter Profile Photo

🔒 Security Practice 5 Config management Storing configs files as plain text in the repo can be catastrophic. Always extract them out of the repo. If your repo is made public by mistake or someone gains access to code, all the secrets will be exposed. #nodejs #security

🔒 Security Practice 5

Config management

Storing configs files as plain text in the repo can be catastrophic. Always extract them out of the repo. If your repo is made public by mistake or someone gains access to code, all the secrets will be exposed. 

#nodejs #security
Ridham Tarpara (@ridhamtarpara) 's Twitter Profile Photo

Twitter users can showcase non-fungible tokens (NFTs) as their profile pictures now. - Meta, Microsoft, Nike, and many more. It's not a bubble anymore #NFTs #web3 #Blockchain

Ridham Tarpara (@ridhamtarpara) 's Twitter Profile Photo

10 lines is a pull request. 500 lines is an issue ticket already assigned to the submitter just waiting to be filled out. 5000 lines is the submitter taking over responsibility for whatever QA finds and not my problem any longer.

Ridham Tarpara (@ridhamtarpara) 's Twitter Profile Photo

🔒 Security Practice 6 Run server process as a non-root user If you run the process as a root user then attackers can have total control over your server machine. People do it to get access to 90/443 port or user docker container which by default runs as a root.

🔒 Security Practice 6

Run server process as a non-root user

If you run the process as a root user then attackers can have total control over your server machine. People do it to get access to 90/443 port or user docker container which by default runs as a root.
Ridham Tarpara (@ridhamtarpara) 's Twitter Profile Photo

🔒 Security Practice 7 Limiting concurrent requests & request body payload It will help against brute-force or DDoS attacks. With large bodies, It will take more time to process the requests and be unable to process important works, leading to vulnerability towards DOS.

🔒 Security Practice 7

Limiting concurrent requests &amp; request body payload

It will help against brute-force or DDoS attacks. With large bodies, It will take more time to process the requests and be unable to process important works, leading to vulnerability towards DOS.
Ridham Tarpara (@ridhamtarpara) 's Twitter Profile Photo

🔒 Security Practice 8 Evil regex can overload Node.js's single-thread execution. Some of the regexes can block the entire event loop for 6 seconds with a single request that validates 10 words. #javascript #nodejs

🔒 Security Practice 8

Evil regex can overload Node.js's single-thread execution. Some of the regexes can block the entire event loop for 6 seconds with a single request that validates 10 words. 

#javascript #nodejs
Harsh Makadia (@makadiaharsh) 's Twitter Profile Photo

It's time to master "The Hot JavaScript Library." An ebook with 10,000+ words in the making! Launching soon for this beautiful community 🔥

It's time to master "The Hot JavaScript Library." 

An ebook with 10,000+ words in the making! 

Launching soon for this beautiful community 🔥
⚡Favor⚡ (@heyonuoha) 's Twitter Profile Photo

Tech Twitter these days be like - JavaScript is hard - CSS makes me cry at night - React is killing me - Frontend is stressful Seriously, have you tried debugging Server side code for hours forgetting to restart the server ????

Jay hustler SEO (@jayhustlerseo) 's Twitter Profile Photo

The On-Page is the Pillar of any SEO activity. That’s not debatable. STEAL my proven On-Page SEO strategy that has generated over 76895 visitors to this client’s website. Just Follow, Like, RT & comment “SEO” to get it Now. (Limited copies)

The On-Page is the Pillar of any SEO activity. That’s not debatable.

STEAL my proven On-Page SEO strategy that has generated over 76895 visitors to this client’s website.

Just Follow, Like, RT &amp; comment “SEO” to get it Now. (Limited copies)