article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And try to understand the basic principles on how web applications works, especially in 2020, because it's going to be load balancers, there's going to be a front end server, and a back end server.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And try to understand the basic principles on how web applications works, especially in 2020, because it's going to be load balancers, there's going to be a front end server, and a back end server.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And try to understand the basic principles on how web applications works, especially in 2020, because it's going to be load balancers, there's going to be a front end server, and a back end server.

article thumbnail

Introduction to Networking: Part 2, A Few More Basics

Scott Lowe

A virtual LAN , aka a VLAN , allows you to have this ability. Switches generally support a variety of load balancing mechanisms, including source-destination MAC addresses, source-destination IP addresses, and sometimes even layer 4 (TCP/UDP) source-destination ports. I welcome all courteous comments, so join in the discussion!

Network 61