Skip to content

Commit

Permalink
fix: shortening subtext, adding meaningful images
Browse files Browse the repository at this point in the history
  • Loading branch information
Buzzpy committed Oct 7, 2024
1 parent 4e5901d commit c22f36e
Show file tree
Hide file tree
Showing 5 changed files with 9 additions and 9 deletions.
2 changes: 1 addition & 1 deletion src/content/terms/Behaviour_driven_development.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"title": "Behaviour Driven development (BDD)",
"subtext": "A software development approach where the application is designed by specifying its behavior through examples written in a human-readable format.",
"subtext": "A software development approach",
"categories": ["Software Development", "Testing Methodologies", "Agile Methodologies"],
"author": "Rilwan",
"description": {
Expand Down
4 changes: 2 additions & 2 deletions src/content/terms/Decryption.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{
"title": "Decryption",
"subtext": "The process of converting encrypted data back into its original form, making it readable again",
"subtext": "Conversion of encrypted data back into its original form",
"categories": ["Cryptography", "Data Security", "Network Security"],
"author": "Rilwan",
"description": {
"title": "Decryption",
"texts": [
"This is the opposite of encryption. In decryption, an encrypted content is converted back to its original form.",
"This is the opposite of encryption. In decryption, an encrypted content is converted back to its original form, making it readable again.",
"For instance, 'bchgtiuythnhuiol' will be decrypted into 'I am beautiful' using the appropriate decryption key."
],
"image": "https://usemynotes.com/wp-content/uploads/2021/03/what-is-decryption.jpg",
Expand Down
4 changes: 2 additions & 2 deletions src/content/terms/Dependency.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"title": "Dependency",
"subtext": "A software component or library that another piece of software relies on to function properly",
"subtext": "A required software library or component that other software relies on",
"categories": ["Software Development", "Package Management", "Build Systems"],
"author": "Rilwan",
"description": {
Expand All @@ -10,7 +10,7 @@
"These dependencies often consist of multiple lines of code designed to perform repetitive or complex tasks efficiently.",
"This packaged code can be installed and used by developers to achieve specific results. For example, `Express` in JavaScript and `Pillow` in Python."
],
"image": "https://phoenixnap.com/blog/wp-content/uploads/2024/01/what-are-software-dependencies.jpg",
"image": "",
"references": [
"https://phoenixnap.com/blog/software-dependencies"
]
Expand Down
2 changes: 1 addition & 1 deletion src/content/terms/Encryption.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"title": "Encryption",
"subtext": "A method of converting plaintext into ciphertext to protect data from unauthorized access",
"subtext": "Converting plaintext into ciphertext to protect data from unauthorized access",
"categories": ["Cryptography", "Data Security", "Network Security"],
"author": "Rilwan",
"description": {
Expand Down
6 changes: 3 additions & 3 deletions src/content/terms/SQL_injection.json
Original file line number Diff line number Diff line change
@@ -1,16 +1,16 @@
{
"title": "SQL Injection (SQLi)",
"subtext": "A security vulnerability that allows attackers to interfere with the queries an application makes to its database, often leading to unauthorized access to data",
"subtext": "A security vulnerability",
"categories": ["Web Security", "Database Security", "Software Vulnerabilities"],
"author": "Rilwan",
"description": {
"title": "SQL Injection (SQLi)",
"texts": [
"SQL injection (SQLi) is a kind of cyber-attack targeted at a software's database.",
"SQL injection (SQLi) is a kind of cyber-attack targeted at a software's database. It allows allows attackers to interfere with the queries an application makes to its database, often leading to unauthorized access to data",
"It involves sending raw SQL statements instead of actual form data via the inputs in a web form or URL.",
"This raw SQL statement is unknowingly received in the backend and used to query the database, revealing unauthorised data to the attacker."
],
"image": "https://cdn.hashnode.com/res/hashnode/image/upload/v1704899971801/80447ae3-883f-4af4-ae7d-ddf10accefb1.png?w=1600&h=840&fit=crop&crop=entropy&auto=compress,format&format=webp",
"image": "https://spanning.com/wp-content/uploads/2019/07/SQL-injection-attack-example.png",
"references": [
"https://superbemiloju.hashnode.dev/protecting-your-data-understanding-sql-injection-and-prevention"
]
Expand Down

0 comments on commit c22f36e

Please sign in to comment.