article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. And try to understand the basic principles on how web applications works, especially in 2020, because it's going to be load balancers, there's going to be a front end server, and a back end server. I started in journalism. and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. And try to understand the basic principles on how web applications works, especially in 2020, because it's going to be load balancers, there's going to be a front end server, and a back end server. I started in journalism. and such.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. And try to understand the basic principles on how web applications works, especially in 2020, because it's going to be load balancers, there's going to be a front end server, and a back end server. I started in journalism. and such.

article thumbnail

Introduction to Networking: Part 2, A Few More Basics

Scott Lowe

A virtual LAN , aka a VLAN , allows you to have this ability. Switches generally support a variety of load balancing mechanisms, including source-destination MAC addresses, source-destination IP addresses, and sometimes even layer 4 (TCP/UDP) source-destination ports. That’s probably enough information for now.

Network 61