g2tech.co Open in urlscan Pro
2606:4700:3035::ac43:b449  Public Scan

URL: https://g2tech.co/
Submission: On August 16 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Home
 * Products
 * Services
 * About
 * Contact us

Sign in Subscribe


LATEST


SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)

Security Information and Event Manager (SIEM) is the term for software and
services combining security information management and security event
management. SIEM is an approach to security management that combines event,
threat and risk data into a single system to improve the detection and
remediation of security issues and provide
Aysan Jahanbakhsh Jul 30, 2024


INTRUSION DETECTION AND PREVENTION SYSTEM

Aysan Jahanbakhsh Jul 27, 2024


ENDPOINT DETECTION AND RESPONSE

Aysan Jahanbakhsh Jul 14, 2024


SONARQUBE: A CODE QUALITY ASSURANCE TOOL

Aysan Jahanbakhsh Jun 9, 2024


CONTAINER SECURITY WITH TRIVY

Aysan Jahanbakhsh Jun 8, 2024


HOW TO DECREASING DOCKER IMAGE BUILD TIME IN LARAVEL APPLICATIONS?

Masoud Tavakkoli Jun 7, 2024


FRONT-END SECURITY

Reza Naserivand Mar 29, 2024 1 comment
Show more


DEVOPS


INTRUSION DETECTION AND PREVENTION SYSTEM

What is IDS? An intrusion detection system is a passive monitoring solution for
detecting cybersecurity threats to an organization. If a potential intrusion is
detected, the IDS generates an alert that notifies security personnel to
investigate the incident and take remediative action. An IDS solution can be
classified in a
Aysan Jahanbakhsh Jul 27, 2024


HOW TO DECREASING DOCKER IMAGE BUILD TIME IN LARAVEL APPLICATIONS?

Masoud Tavakkoli Jun 7, 2024


MONITOR LINUX SERVERS PART 2: HOW TO INSTALL AND CONFIGURE NODE EXPORTER ON A
LINUX SERVER

Arsalan Sefidgar Feb 10, 2023


HOW TO INSTALL KEYCLOAK USING DOCKER

Masoud Tavakkoli Jan 31, 2023 1 comment


HOW TO INSTALL AND CONFIGURE PROMETHEUS ON A LINUX SERVER

Arsalan Sefidgar Jan 29, 2023


INCREASE LARAVEL PERFORMANCE — PART 1 OPCACHE!

Masoud Tavakkoli Jun 21, 2022


HOW TO REPLICATE MYSQL IN A FEW EASY STEPS!

Masoud Tavakkoli Jun 1, 2021
Show more


SECURITY


SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)

Security Information and Event Manager (SIEM) is the term for software and
services combining security information management and security event
management. SIEM is an approach to security management that combines event,
threat and risk data into a single system to improve the detection and
remediation of security issues and provide
Aysan Jahanbakhsh Jul 30, 2024


INTRUSION DETECTION AND PREVENTION SYSTEM

Aysan Jahanbakhsh Jul 27, 2024


ENDPOINT DETECTION AND RESPONSE

Aysan Jahanbakhsh Jul 14, 2024


SONARQUBE: A CODE QUALITY ASSURANCE TOOL

Aysan Jahanbakhsh Jun 9, 2024


CONTAINER SECURITY WITH TRIVY

Aysan Jahanbakhsh Jun 8, 2024


FRONT-END SECURITY

Reza Naserivand Mar 29, 2024 1 comment
Show more


FRONTEND


FRONT-END SECURITY

Front-end security refers to the measures and practices implemented to protect
the client-side components of a web application, such as web browsers, user
interfaces, and client-side scripts, from various security threats and
vulnerabilities. Ensuring front-end security is crucial for safeguarding
sensitive data, maintaining user privacy, and preventing unauthorized access to
Reza Naserivand Mar 29, 2024 1 comment


THE BEST FRONT-END DESIGN PATTERNS

Reza Naserivand Jan 7, 2024


WHAT IS NOINDEX AND HOW TO IMPLEMENT IT?

Tina Hosseinpour Dec 13, 2023 1 comment


LOCAL STORAGE AND COOKIES: EXPLANATION AND USAGE

Arshia Montakhabi Jul 15, 2023


IS THERE ANY REAL COMPILED PROGRAMMING LANGUAGE?!

Milito Jun 23, 2023


INTRODUCTION TO GHOST CMS

Hossein Fouladi Feb 27, 2023
Show more


BACKEND


ENDPOINT DETECTION AND RESPONSE

Endpoint Detection and Response (EDR), also referred to as endpoint detection
and threat response (EDTR), is an endpoint security solution that continuously
monitors end-user devices to detect and respond to cyber threats like ransomware
and malware. EDR is defined as a solution that “records and stores
endpoint-system-level behaviors, uses various
Aysan Jahanbakhsh Jul 14, 2024


FEATURE TESTS IN BACK-END APPLICATIONS: A COMPREHENSIVE GUIDE

Arshia Montakhabi Nov 3, 2023


BOOSTING PRODUCTIVITY WITH THE PIPELINE DESIGN PATTERN FOR SQL SORTING AND
FILTERING IN LARAVEL

Arshia Montakhabi Jul 25, 2023


IS THERE ANY REAL COMPILED PROGRAMMING LANGUAGE?!

Milito Jun 23, 2023


ASYNC TASKS QUEUING WITH CELERY — A CONCEPTUAL APPROACH

Sina Hariri May 18, 2023


INCREASE LARAVEL PERFORMANCE — PART 1 OPCACHE!

Masoud Tavakkoli Jun 21, 2022


HOW TO REPLICATE MYSQL IN A FEW EASY STEPS!

Masoud Tavakkoli Jun 1, 2021
Show more


DEVELOPMENT

More


CONTAINER SECURITY WITH TRIVY


BOOSTING PRODUCTIVITY WITH THE PIPELINE DESIGN PATTERN FOR SQL SORTING AND
FILTERING IN LARAVEL


LOCAL STORAGE AND COOKIES: EXPLANATION AND USAGE


IS THERE ANY REAL COMPILED PROGRAMMING LANGUAGE?!


ADDING A CUSTOMIZED COMPOSER PACKAGE TO YOUR LARAVEL PROJECT


SUBSCRIBE TO G2TECH

Don't miss out on the latest news. Sign up now to get access to the library of
members-only articles.
Subscribe now
 * G2 Holding
 * Sign up
 * Products
 * Contact us
 * About
 * Github
 * Instagram

G2Tech is a software company based in Turkey with a talented and enthusiastic
team that works with cutting-edge technologies. © G2Tech.co 2023. All rights
reserved.