jennifer

I'm a software developer with a strong interest in cybersecurity. I write for several large companies including Microsoft and Adobe. If you need a writer, contact me on Upwork and browse my portfolio, and we can discuss your project. You can find my profile and portfolio at https://www.upwork.com/fl/jenniferm.

encryption using tls and ciphers

A Developer Guide to Performing a TLS Handshake

You probably know that your HTTP requests will likely use TLS (Transport Layer Security) to create an encrypted connection, but most developers don’t know what happens in a client-server connection when it’s encrypted using TLS. This article will explain a TLS handshake to give developers a better understanding of how…

Using Python to Find Firebase Storage Security Misconfigurations Hardcoded in Repositories

Most applications need a database to store backend data, and Google Firebase is a great choice for serverless data management. It’s a cloud-based database hosted in Google Cloud, and it’s simple to connect from your mobile app code. Its use cases span from chat applications to easier ways to send…

excel spreadsheet formulas

CSV Injection Tutorial for Beginner Developers (with examples)

It’s common in coding to work with CSV (Comma Separated Values) files to transfer data between platforms or allow users to download files that can then be used in their favorite application. CSV files are just text files where each value in a record is separated by a comma. As…

secure session

Session Hijacking Tutorial for Beginner Developers

As a programmer, you will often work with user sessions. A user session is a randomly generated alphanumeric value that identifies the user on the server. In most applications, the user session is stored in a cookie for reuse as the user makes calls back to the server in the…

secure programming

Easy Buffer Overflow Attack Tutorial for Beginner Programmers

When a software developer codes a variable into their application, the system allocates a specific number of bytes to hold data. Usually, the data passed to the variable is from user input, but it could also be from another system or application. Some languages have validation in place that makes…

Machine Learning Engineering: Career Guide 2021

Machine Learning Engineering: Career Guide 2021

I recently looked into what it would take to start a career in machine learning. I did a lot of research and combined everything you need to know to get started. Read this guide to figure out if machine learning is something that interests you. If you’re interested in reading…

API OAuth Authorization Tutorial

A Tutorial on OAuth Authorization with the Upwork API using .NET C#

The Upwork API has several endpoints that can be used to search freelancers, manage jobs and messages, and get reports. Most of the functionality for the web UI for both freelancers and clients is available in the API. Note: You cannot create accounts or manage account settings from the API.…

How to Set Up a Second IP on a Windows Azure VM Without PowerShell

When you create a Windows virtual machine in Azure, a network interface card is automatically set up with a private and public IP address assigned to it. You might want to host another website with its own IP to make SSL binding easier. To configure a new IP, you must…

How to Set Up an SSL Certificate on an Azure IIS VM Without Powershell

I recently moved a website from an Azure app service that was costing way too much for a small WordPress site to a virtual machine that gave me more control and cost less money every month. A virtual machine for a small site costs less but takes much more setup…

Why Chrome Responds with The SSL Certificate Used to Load Resources Will Be Distrusted in M70

If you’ve looked at your site from Chrome Developer Tools and use an SSL certificate that you purchased from Symantec, you probably see the following warning: The SSL certificate used to load resources from https://xxxxxx.com will be distrusted in M70. Once distrusted, users will be prevented from loading these resources.…