DEV Community

Philip Case profile picture

Philip Case

Full-Stack Developer; Certified Ethical Hacker CEH

Joined Joined on  github website

Education

MIT

Work

Full-Stack Software Developer

Elevate Your Game: Be a Boss-Level Software Engineer with These 12 Skills

Elevate Your Game: Be a Boss-Level Software Engineer with These 12 Skills

Comments
3 min read
The Constructor Chronicles: Unraveling the Secrets of JavaScript Object Creation

The Constructor Chronicles: Unraveling the Secrets of JavaScript Object Creation

Comments
6 min read
Supercharge Your Development: 14 Must-Have Chrome Extensions for Beginners

Supercharge Your Development: 14 Must-Have Chrome Extensions for Beginners

Comments
4 min read
Cyber Vendetta: The Rise and Reign of the World's Top 5 Dangerous Hacker Groups

Cyber Vendetta: The Rise and Reign of the World's Top 5 Dangerous Hacker Groups

Comments
2 min read
License to Hack: The Top 12 Cybersecurity Certifications for Aspiring Secret Agents

License to Hack: The Top 12 Cybersecurity Certifications for Aspiring Secret Agents

1
Comments 1
6 min read
Protecting Personally Identifiable Information (PII) in Web Scraping: Technical Aspects and Industry Standards

Protecting Personally Identifiable Information (PII) in Web Scraping: Technical Aspects and Industry Standards

Comments
4 min read
Breaking Barriers: Exploring the Cutting-Edge Web Frameworks Redefining the Development Landscape

Breaking Barriers: Exploring the Cutting-Edge Web Frameworks Redefining the Development Landscape

Comments 1
3 min read
Unmasking the Bulls-Eye: The Most Targeted Industries for Cyber Attack

Unmasking the Bulls-Eye: The Most Targeted Industries for Cyber Attack

Comments
4 min read
I Like to MoveIt MoveIt! Deep Dive into MoveIt File Transfer Software Vulnerabilities Exploited by the Clop Ransomware Group

I Like to MoveIt MoveIt! Deep Dive into MoveIt File Transfer Software Vulnerabilities Exploited by the Clop Ransomware Group

Comments
3 min read
Unlocking MoveIt's Pandora's Box: The Intricate Exploit Vectors Behind the Recent Cyber Attacks

Unlocking MoveIt's Pandora's Box: The Intricate Exploit Vectors Behind the Recent Cyber Attacks

Comments
3 min read
Cyber Warfare Unleashed: The Rise of MoveIt Exploits and the Clop Ransomware Menace

Cyber Warfare Unleashed: The Rise of MoveIt Exploits and the Clop Ransomware Menace

Comments
2 min read
Snapshot of the Most Popular Programming Languages in 2023

Snapshot of the Most Popular Programming Languages in 2023

2
Comments
3 min read
Defend, Detect, and Dominate: Strengthen Your JavaScript Code with NPM Audit's Security Audit

Defend, Detect, and Dominate: Strengthen Your JavaScript Code with NPM Audit's Security Audit

Comments
2 min read
Exploring the Basics of BASH Shell Scripting: A Journey into Automation

Exploring the Basics of BASH Shell Scripting: A Journey into Automation

Comments
3 min read
loading...