Hello, I am Zsolt Udvardy, a security-focused full-stack developer and Dell engineer with a passion for innovation in the field of information technology. I am highly ambitious and dedicated to expanding my expertise in web programming, specializing in languages such as PHP, Ajax, and Python with a focus on artificial intelligence. I actively participate in cybersecurity conferences, including the National Cyber Security Programme, and I am a proud member of BCS (The Chartered Institute for IT). This page will be continuously updated as I acquire and showcase new skills.
Years of Experience
Project Complete
Happy Coints
Dell engineer. Also, Cyber Security student at Kingston University. I am very ambitious and determined to expand my knowledge further in informative technology. My main focus is to attain professional acknowledgement about web programming in PHP, Ajax and Python. ...
I create Web Applications, including data structure, database and database connection, and Upload to servers. The design is also a priority, the Front and Back-end, while the most important is security: security headers, SQL Injection, and Protected App against DDoS attacks. ..BLABLA.
My priority is maintaining an expert level in Cyber Security, and I am present at almost all cybersecurity conferences, such as the National Cyber Security programme. This page will update by uploading more skills. ...
I started to work as an IT engineer from a young adult age. Our family company fixed and built a new personal computer at the customer's house. Quick decision, found the best solution. Same as I did at Dell Computer. Hardware and software components. LCD, Keyboard or motherboard replacement. ...
Web application security is the practice of protecting websites, applications, and APIs from attacks. It is a broad discipline, but its ultimate aims are keeping web applications functioning smoothly and protecting business from cyber vandalism, data theft, unethical competition, and other negative consequences.
Zero-day vulnerabilities: These are vulnerabilities unknown to an application’s makers, and which thus do not have a fix available. We now see more than 20,000 every year. Attacks look to exploit these vulnerabilities quickly, and often follow up by seeking to evade protections put in place by security vendors.
SQL injection (SQi):SQi is a method by which an attacker exploits vulnerabilities in the way a database executes search queries. Attackers use SQi to gain access to unauthorized information, modify or create new user permissions, or otherwise manipulate or destroy sensitive data.
Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks: Through a variety of vectors, attackers are able to overload a targeted server or its surrounding infrastructure with different types of attack traffic. When a server is no longer able to effectively process incoming requests, it begins to behave sluggishly and eventually deny service to incoming requests from legitimate users.