Software Engineering Highlights

Software Engineering Highlights

Hussein Nasser via YouTube Direct link

Vulnerbility Based Denial of Service Attack Explained

28 of 37

28 of 37

Vulnerbility Based Denial of Service Attack Explained

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Software Engineering Highlights

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Spin up a Postgres Instance & PGADMIN with Docker
  2. 2 The good, the bad & the ugly of WebSockets
  3. 3 Building TCP & UDP Servers with Node JS
  4. 4 How IndexedDB Works?
  5. 5 What is Layer 4 Load Balancer?
  6. 6 What is Layer 7 Load Balancer?
  7. 7 gitHub Authorization REST API
  8. 8 How an HTTP Proxy works and How to Build one? (Node JS)
  9. 9 Publish Subscribe In Redis
  10. 10 Redis Networking Transport Protocol
  11. 11 Spin up Redis on Docker and learn basic commands
  12. 12 How HTTPS Work?
  13. 13 Spin up Kafka Broker and Zookeeper on Docker
  14. 14 Spin up RabbitMQ on Docker
  15. 15 Port forwarding with DNAT and Iptables
  16. 16 The Huge Flaw HTTP 1.0 Had...
  17. 17 The Bare-Bones of a Service Mesh Proxy
  18. 18 HSTS - HTTP Strict Transport Security - Limitations
  19. 19 Hosting 3 WebSites on one IP Address with SNI and HAProxy
  20. 20 SameSite, Lax Cookies and Cross Site Request Forgery with example
  21. 21 When to use GraphQL over REST?
  22. 22 When do I Monetize My Personal Brand?
  23. 23 The problem with error management in GraphQL
  24. 24 What is a Database transaction?
  25. 25 SNI Limitation and Invention of ESNI
  26. 26 The basic components of RabbitMQ
  27. 27 NginX as a Layer 7 Proxy
  28. 28 Vulnerbility Based Denial of Service Attack Explained
  29. 29 Blocking Single Threaded Web Server
  30. 30 How do Browsers Force HTTPS with HSTS and How it can prevent SSL Stripping?
  31. 31 How HAProxy acts as TCP Proxy & HTTP Proxy Layer 4 vs Layer 7
  32. 32 Layer 4 Proxying in NginX
  33. 33 Row-Level Database Locks Explained - (Read vs Exclusive)
  34. 34 What is SSL Stripping?
  35. 35 Why Browsers have 6 active TCP Connections for each website?
  36. 36 This is why gRPC was invented
  37. 37 gRPC - The good, the bad and the ugly

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.