Table of Contents Why Enable SSL for Databases? Security is critical for any application, especially when dealing with sensitive data like financial records or user information. Databases such as MongoDB and PostgreSQL communicate over the network, making them vulnerable to interception. SSL (Secure Sockets Layer) encrypts the communication between the...
More Stories
Migration Guide: From RestAssured to Keploy
Table of Contents If you’re tired of writing endless lines of repetitive code in RestAssured just to test your APIs,...
How to handle Node.js Code Coverage with NYC in Docker Containers
Table of Contents There are particular difficulties in getting NYC coverage from Node.js operating in Docker containers. This blog discusses...
BitBucket Self-Hosting : Running ebpf/Privileged programs
Table of Contents Bitbucket is a robust tool for source code management and continuous integration/continuous deployment (CI/CD). It offers flexibility...
Efficient DOM Manipulation with the Virtual DOM and Refs
Table of Contents The Secret to Fast and Responsive Websites Ever wondered why your favorite websites are so fast and...
Revolutionising Unit Test Generation with LLMs
Table of Contents “Discovering the unexpected is more important than confirming the known.” – George E. P. Box As software...
How to Use covdata for Better Go Code Coverage
Table of Contents When you run your Go programs or integration tests, numbers of raw coverage files are typically generated...
My Testing Journey with Jasmine and Mocha
Table of Contents We all know the why it’s important to write clean, reliable code. But let’s face it, catching...
Why Traditional API Testing Fails? Comparing Shadow, Production, Replay Techniques
Table of Contents I want to share the story of how our team at a fast-paced startup tackled the challenge...
Decoding Network Traffic: Telemetry with Network Activity
Table of Contents Network Telemetry, in simple terms, is like having a conversation with machines or systems located far away....
Create Stunning Parallax Animations on Your Website
Table of Contents Have you ever come across a website that made you scroll over it again just to see...
Using TC-BPF program to redirect DNS traffic in docker containers
Table of Contents The adoption of eBPF (Extended Berkeley Packet Filter) has revolutionized high-performance applications, tracing, security, and packet filtering...
Adding colour to the log output of logging libraries in Go
Table of Contents Logging is an integral part of software development, providing developers with valuable insights into the behaviour and...
SCRAM Authentication: Overcoming Mock Testing Challenges
Table of Contents In the vast landscape of cybersecurity, authentication stands as the guardian of digital fortresses, ensuring that only...
Choosing the Perfect Message Queue: Factors to Consider
Table of Contents Not long ago, I was handed a problem that’s no stranger to the world of programming: making...
Managing Go Processes
Table of Contents Introduction: The Challenge of Managing Blocking Processes While working on an application that required executing a command...
Getting code coverage data for each request coming to a python web server
Table of Contents In this blog, we will demonstrate how to get the code coverage data for each incoming request...
MongoDB in Mock Mode: Acting the Server Part
Table of Contents Imagine, for a moment, a scenario where instead of writing mocks with pre-defined behaviours, you can duplicate...
Capture gRPC Traffic going out from a Server
Table of Contents How does gRPC work? A quick Google search would tell you that it uses HTTP/2.0 under the...
Integration vs E2E Testing: What worked for me as a charm
Table of Contents When it comes to testing software applications, various testing techniques can be employed. Three common testing methods...
Automated E2E tests using Property Based Testing | Part II
Table of Contents If you haven’t visited Part I, I highly recommend you go through it for a better understanding...
Automated End to End tests using Property Based Testing | Part I
Table of Contents ” Engineers call them edge cases. I call them: what our users do ” – Noah Sussman...
Go Mocks and Stubs generator Made Easy
Table of Contents Testing network stuff like APIs and database calls can be a real pain: I find myself burning...