The DNS or the Domain Name System is considered the Internet’s phonebook, it’s a place that stores the domain settings in terms of records, here you can manage how a domain will behave in terms of IP resolution, aliases, email servers, and more advanced features.

If you are not familiar…

This is critical for evaluating when something wrong happens.

We can plan and control many things, even disasters.

For software, we have different approaches. Let’s split this into the site types, how replication is done and how to work on the continuity of operations.

For the site types of disaster…

This second part is all about server administration in terms of software from a general perspective. Prior to this next step, we should already need to have selected and acquired a functional server in any form with all its hardware specifications.

Right after the pre-requisites are fulfilled, the next thing…

In a computational system, the server is the keystone for the well-being and the future of whatever product is hosted over there. The main effort is always focused on software planning but sometimes goes beyond that.

Without proper planning on the hosting system, server specs of any HW characteristics, your…

The most used mechanism in the security perspective is authentication, this is the process of providing you as a user, a way to say who you are. In terms of authentication, there are no strict rules to follow up, but of course, best practices when implementing.

Good authentication methods are…

Data is everything today, specifically in software, the rise of data-driven applications is unleashed and the need for securing is a must-do. The challenge of every security team is to keep the users’ secure, the data sent and stored should be read-only by us.

Another responsibility is to prevent attacks…

This last principle has a lot to do when designing software and its responsibilities. Large software comes in modules, many times as stated in many of the previous principles, the developers try to avoid tight cohesion between them, but, this is not the case most of the time.

This principle…

This is the fourth one, and it’s very direct. It sets that no client should be forced to depend on methods that do not use.

Leaving a blank method is a sign of a bad software design, of course, this can be fixed by using Interfaces as the data structure…

This one complicates things a little bit because this Principle sets that Objects should be replaceable with their subtypes without affecting the correctness of the program.

If you have any familiarity with OOP programming, inheritance is the way of thinking when implementing this principle.

Here’s an analogy to better understand…

This is the 2nd rule of the 5 that conforms to the SOLID principles.

This principle sets that the software components should be closed for modification but open for extension. At some point this becomes weird, but it is simple to understand.

The Closed part sets that whenever new features…

David E Lares S

Backend Developer, Pentesting and InfoSec Student

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store