Author: Arunangshu Das

Trust me, I'm a software developer—debugging by day, chilling by night.

Authentication Differ

In the digital age, two terms often surface in discussions of security and access control: authentication and authorization. While these concepts are closely related, they serve distinct functions in safeguarding systems, data, and resources. Understanding the difference between authentication and authorization is crucial for anyone looking to enhance their digital security skills or manage access to online systems effectively. Introduction to Authentication and Authorization Authentication and authorization are foundational components in digital security, but they focus on different aspects of user access. Authentication verifies the identity of a user, while authorization determines what resources or data that identified user can…

Read More
Web Development

In today’s digital landscape, creating an inclusive experience on the web is not just a trend—it’s a necessity. Web accessibility refers to the practice of designing and developing websites so that people with various disabilities can perceive, understand, navigate, interact with, and contribute to the web. Emphasizing accessibility in web development isn’t just about fulfilling legal obligations; it’s about creating a more equitable internet for everyone. In this blog post, we’ll explore the key aspects of accessibility, why it’s critical, and how web developers can implement accessibility practices to build a more inclusive web. What is Accessibility in Web Development?…

Read More
Web Browser Rendering Work

The rendering process in web browsers is complex and intricate, responsible for translating raw code (HTML, CSS, JavaScript) into the visual experiences we interact with daily on our screens. Understanding how this rendering works is not only valuable for developers seeking to optimize their web applications but also for anyone interested in the mechanics of the modern internet. 1. The Basics: What is a Web Browser? A web browser is a software application that retrieves, presents, and interacts with content on the internet. Popular browsers include Chrome, Firefox, Safari, Edge, and Opera. Each of these browsers shares the same core…

Read More
XSS Attacks

In today’s digital landscape, web applications are exposed to various security vulnerabilities, with Cross-Site Scripting (XSS) attacks being one of the most common and dangerous. XSS attacks exploit security weaknesses on the client side, allowing attackers to inject malicious scripts into web pages viewed by users. When these scripts are executed, they can steal sensitive information, hijack user sessions, redirect users to malicious websites, and more. What is an XSS Attack? Cross-Site Scripting (XSS) is a type of injection attack where an attacker injects malicious scripts into content from otherwise trusted websites. These scripts are executed in the user’s browser…

Read More
CI/CD

In today’s fast-paced software development world, the terms “CI/CD” have become essential. Short for Continuous Integration (CI) and Continuous Delivery/Deployment (CD), these practices have transformed how teams build, test, and deploy software, resulting in higher quality, faster releases, and greater customer satisfaction. 1. Understanding CI/CD What is CI (Continuous Integration)? Continuous Integration (CI) is a software development practice where developers frequently merge their code changes into a shared repository, usually multiple times a day. The main idea behind CI is to catch bugs and integration issues early by automatically building and testing the code every time a change is made.…

Read More
Containerization

In the world of DevOps, containerization has become a transformative technology, reshaping how applications are developed, deployed, and managed. By packaging software in “containers,” teams can create isolated environments that bundle an application with its dependencies, allowing for consistent operation across various environments. This guide will dive into how containerization works in DevOps, its advantages, and how it supports a streamlined development-to-deployment pipeline. What is Containerization? Containerization is a form of virtualization at the OS level, where applications are packaged along with all the libraries, dependencies, and configurations they need to run. Unlike traditional virtual machines, which virtualize entire operating…

Read More
deployment pipeline

In today’s fast-paced digital landscape, the deployment pipeline has become a crucial part of software development and operations. It is designed to streamline the process of taking code from development to production, ensuring that software is consistently delivered to users with speed, efficiency, and reliability. A deployment pipeline is not just a technical structure; it is a strategic asset that improves collaboration, quality, and the adaptability of software in production environments. In this post, we’ll dive into the purpose of a deployment pipeline, its components, and how it enhances the entire development lifecycle. What is a Deployment Pipeline? A deployment…

Read More
monitoring

In today’s fast-paced software development landscape, DevOps has emerged as a critical practice that integrates software development (Dev) and IT operations (Ops). One of the core tenets of DevOps is ensuring the reliability, availability, and performance of applications in production. A key aspect of achieving these goals is through effective monitoring and logging. This blog post will delve into how monitoring and logging work in a DevOps environment, their significance, and best practices for implementation. What is Monitoring in DevOps? Monitoring refers to the process of continuously assessing the performance, availability, and health of software applications and infrastructure. It involves…

Read More
Token-Based Authentication

In the era of modern web applications and APIs, token-based authentication has become a cornerstone of secure authorization practices. Developers now rely on tokens to provide scalable, stateless, and secure mechanisms for authenticating users. Among these, JSON Web Token (JWT) has gained immense popularity for its simplicity. However, as security demands evolve, alternatives like Platform-Agnostic Security Tokens (Paseto) are emerging, addressing vulnerabilities inherent in JWT. How Does Token-Based Authentication Work? Token-based authentication shifts away from server-side session storage by issuing tokens to authenticated clients. Here’s how the process typically unfolds: User Login: Users provide their credentials (username and password). Authentication:…

Read More
Chrome DevTools

Memory leaks are among the most common and challenging issues in web development. They can lead to sluggish performance, unresponsive applications, and even crashes. Fortunately, Chrome DevTools provides robust tools to analyze and debug memory leaks effectively. 1. What Are Memory Leaks? A memory leak occurs when memory that is no longer needed is not released. In JavaScript, memory is managed via garbage collection (GC). The garbage collector automatically identifies and reclaims unused memory. However, when references to objects persist unintentionally, the garbage collector cannot clean them up, leading to a memory leak. Over time, these leaks can consume significant…

Read More