DEV Community

Mohammad Waseem profile picture

Mohammad Waseem

404 bio not found

Joined Joined on  Personal website https://tempomailusa.com/
Leveraging SQL to Test Geo-Blocked Features in a Microservices Environment

Leveraging SQL to Test Geo-Blocked Features in a Microservices Environment

Comments
2 min read

Want to connect with Mohammad Waseem?

Create an account to connect with Mohammad Waseem. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Overcoming IP Bans in Scraping with Kubernetes and Microservices

Overcoming IP Bans in Scraping with Kubernetes and Microservices

Comments
2 min read
Strategic Approaches to Avoid Spam Traps in Legacy React Codebases

Strategic Approaches to Avoid Spam Traps in Legacy React Codebases

Comments
3 min read
Rapid Query Optimization with Docker: A DevOps Approach Under Tight Deadlines

Rapid Query Optimization with Docker: A DevOps Approach Under Tight Deadlines

Comments
2 min read
Scaling Authentication Automation During High Traffic Events with DevOps Excellence

Scaling Authentication Automation During High Traffic Events with DevOps Excellence

Comments
2 min read
Streamlining Email Flow Validation in Microservices with TypeScript

Streamlining Email Flow Validation in Microservices with TypeScript

Comments
2 min read
Efficient Test Account Management Using Web Scraping on a Zero-Budget

Efficient Test Account Management Using Web Scraping on a Zero-Budget

Comments
3 min read
Rapid Optimization of Slow Database Queries with Python in High-Pressure DevOps Scenarios

Rapid Optimization of Slow Database Queries with Python in High-Pressure DevOps Scenarios

Comments
2 min read
Securing Test Environments: Eliminating PII Leaks in Legacy React Codebases

Securing Test Environments: Eliminating PII Leaks in Legacy React Codebases

Comments
3 min read
Scaling React for Massive Load Testing in Enterprise Environments

Scaling React for Massive Load Testing in Enterprise Environments

Comments
2 min read
Mastering Geo-Blocked Feature Testing Under High Traffic with SQL Strategies

Mastering Geo-Blocked Feature Testing Under High Traffic with SQL Strategies

Comments
3 min read
Taming Dirty Data: Node.js Strategies for Data Sanitization in Security Research

Taming Dirty Data: Node.js Strategies for Data Sanitization in Security Research

Comments
2 min read
Overcoming Geo-Blocking: A TypeScript-Based Strategy for Testing Location-Restricted Features

Overcoming Geo-Blocking: A TypeScript-Based Strategy for Testing Location-Restricted Features

Comments
3 min read
Streamlining Slow Queries Through QA Testing Under Tight Deadlines

Streamlining Slow Queries Through QA Testing Under Tight Deadlines

Comments
2 min read
Securing Test Environments: Eliminating PII Leaks with Python on Zero Budget

Securing Test Environments: Eliminating PII Leaks with Python on Zero Budget

Comments
2 min read
Scaling Microservices with Node.js: Handling Massive Load Testing as a Lead QA Engineer

Scaling Microservices with Node.js: Handling Massive Load Testing as a Lead QA Engineer

Comments
3 min read
Mastering Resilient Web Scraping in Rust During High Traffic Events

Mastering Resilient Web Scraping in Rust During High Traffic Events

Comments
2 min read
Decoding Email Validation Flows in Cybersecurity: A Secrets-Driven Approach

Decoding Email Validation Flows in Cybersecurity: A Secrets-Driven Approach

Comments
3 min read
Streamlining Authentication Flows with Rust: A Senior Architect’s Quick Win

Streamlining Authentication Flows with Rust: A Senior Architect’s Quick Win

Comments
2 min read
Overcoming Geo-Blocked Features in Microservices: A QA Testing Strategy for Global Deployment

Overcoming Geo-Blocked Features in Microservices: A QA Testing Strategy for Global Deployment

Comments
2 min read
Overcoming Geo-Restrictions in Legacy Web Apps Through Advanced Web Scraping Techniques

Overcoming Geo-Restrictions in Legacy Web Apps Through Advanced Web Scraping Techniques

Comments
3 min read
Mitigating Leaking PII in Test Environments with Web Scraping Techniques

Mitigating Leaking PII in Test Environments with Web Scraping Techniques

Comments
3 min read
Scaling Load Testing with React: A Zero-Budget Security Researcher’s Approach

Scaling Load Testing with React: A Zero-Budget Security Researcher’s Approach

Comments
3 min read
Mastering Query Optimization in High-Traffic Events with TypeScript

Mastering Query Optimization in High-Traffic Events with TypeScript

Comments
3 min read
Leveraging Web Scraping to Validate Email Flows in a Microservices Environment

Leveraging Web Scraping to Validate Email Flows in a Microservices Environment

Comments
3 min read
Securing Developer Environments Under High Traffic: A Go-based Isolation Strategy

Securing Developer Environments Under High Traffic: A Go-based Isolation Strategy

Comments
3 min read
Mastering Memory Leak Debugging in Legacy Linux Codebases: A Lead QA Engineer's Approach

Mastering Memory Leak Debugging in Legacy Linux Codebases: A Lead QA Engineer's Approach

Comments
2 min read
Harnessing DevOps to Debug and Eliminate Memory Leaks at Scale

Harnessing DevOps to Debug and Eliminate Memory Leaks at Scale

Comments
2 min read
Scaling Authentication Flows During High Traffic Events with API-Driven DevOps Strategies

Scaling Authentication Flows During High Traffic Events with API-Driven DevOps Strategies

Comments
2 min read
Solving Memory Leaks in Node.js with Zero Budget: A DevOps Approach

Solving Memory Leaks in Node.js with Zero Budget: A DevOps Approach

Comments
2 min read
Mitigating Spam Traps in Microservices: An API-Driven DevOps Approach

Mitigating Spam Traps in Microservices: An API-Driven DevOps Approach

Comments
3 min read
Leveraging Kubernetes for Secure Access: Bypassing Gated Content on a Zero Budget

Leveraging Kubernetes for Secure Access: Bypassing Gated Content on a Zero Budget

Comments
3 min read
Innovative Approach to Isolating Dev Environments Using Web Scraping Techniques

Innovative Approach to Isolating Dev Environments Using Web Scraping Techniques

Comments
2 min read
Mitigating Spam Traps with Cost-Free QA Testing: A DevOps Approach

Mitigating Spam Traps with Cost-Free QA Testing: A DevOps Approach

Comments
3 min read
Scaling Load Testing to Infinite: Zero-Budget Docker Strategies for Massive Traffic Simulation

Scaling Load Testing to Infinite: Zero-Budget Docker Strategies for Massive Traffic Simulation

Comments
3 min read
Isolating Development Environments for High-Traffic QA Testing: A Strategic Approach

Isolating Development Environments for High-Traffic QA Testing: A Strategic Approach

Comments
3 min read
Automating Authentication Flows in Go Without Budget: A Security Researcher’s Approach

Automating Authentication Flows in Go Without Budget: A Security Researcher’s Approach

Comments
3 min read
Securing Test Environments: How a Developer Fast-Tracked PII Protection with React

Securing Test Environments: How a Developer Fast-Tracked PII Protection with React

Comments
3 min read
Scaling Load Testing with Node.js on a Zero-Budget Infrastructure

Scaling Load Testing with Node.js on a Zero-Budget Infrastructure

Comments
2 min read
Bypassing Gated Content in Go: Open Source Strategies for Secure Access

Bypassing Gated Content in Go: Open Source Strategies for Secure Access

Comments
2 min read
Securing Legacy Test Environments: Eliminating PII Leaks with API-Driven Dependency Injection

Securing Legacy Test Environments: Eliminating PII Leaks with API-Driven Dependency Injection

Comments
3 min read
Optimizing Slow Queries in Microservices with JavaScript: A Security Perspective

Optimizing Slow Queries in Microservices with JavaScript: A Security Perspective

Comments
2 min read
Bypassing Gated Content with Zero-Budget API Strategies: A Lead QA Engineer’s Approach

Bypassing Gated Content with Zero-Budget API Strategies: A Lead QA Engineer’s Approach

Comments
3 min read
Mitigating Spam Traps in Microservices Email Pipelines Using Linux and DevOps Best Practices

Mitigating Spam Traps in Microservices Email Pipelines Using Linux and DevOps Best Practices

Comments
2 min read
Detecting Phishing Patterns in Node.js: A Practical Approach for Security Researchers

Detecting Phishing Patterns in Node.js: A Practical Approach for Security Researchers

Comments
2 min read
Mitigating Database Clutter in Enterprise Environments with Kubernetes

Mitigating Database Clutter in Enterprise Environments with Kubernetes

Comments
2 min read
Streamlining Test Account Management with Open Source Web Scraping Techniques

Streamlining Test Account Management with Open Source Web Scraping Techniques

Comments
2 min read
Leveraging Open Source QA Tools to Debug Memory Leaks: A Security Researcher’s Approach

Leveraging Open Source QA Tools to Debug Memory Leaks: A Security Researcher’s Approach

Comments
2 min read
Enhancing Isolation in Microservice Development Environments with Docker

Enhancing Isolation in Microservice Development Environments with Docker

Comments
2 min read
Mastering Environment Isolation: DevOps Strategies for Enterprise Developers

Mastering Environment Isolation: DevOps Strategies for Enterprise Developers

Comments
2 min read
Harnessing DevOps and Open Source Tools to Automate Dirty Data Cleaning

Harnessing DevOps and Open Source Tools to Automate Dirty Data Cleaning

Comments
2 min read
Harnessing TypeScript and Open Source Tools for Massive Load Testing Security Verification

Harnessing TypeScript and Open Source Tools for Massive Load Testing Security Verification

Comments
3 min read
Mastering Memory Leak Debugging on Linux with Open Source Tools

Mastering Memory Leak Debugging on Linux with Open Source Tools

Comments
2 min read
Overcoming Geo-Restrictions with JavaScript: A Zero-Budget Approach for Security Researchers

Overcoming Geo-Restrictions with JavaScript: A Zero-Budget Approach for Security Researchers

Comments
2 min read
Streamlining Data Cleanup in Linux: A DevOps Approach to Tackle Dirty Data Under Tight Deadlines

Streamlining Data Cleanup in Linux: A DevOps Approach to Tackle Dirty Data Under Tight Deadlines

Comments
2 min read
Leveraging Web Scraping for Debugging Memory Leaks in Microservices Architecture

Leveraging Web Scraping for Debugging Memory Leaks in Microservices Architecture

Comments
2 min read
Bypassing Gated Content with Docker and Open Source Tools: A Strategic Approach

Bypassing Gated Content with Docker and Open Source Tools: A Strategic Approach

Comments
2 min read
Using Docker to Prevent Spam Traps in Legacy Codebases: A DevOps Approach

Using Docker to Prevent Spam Traps in Legacy Codebases: A DevOps Approach

Comments
2 min read
Securing Test Environments: Eliminating PII Leaks with Open Source Tools

Securing Test Environments: Eliminating PII Leaks with Open Source Tools

Comments
2 min read
Mitigating Spam Traps in Legacy Email Campaigns with Linux and DevOps Strategies

Mitigating Spam Traps in Legacy Email Campaigns with Linux and DevOps Strategies

Comments
3 min read
loading...