From front end web design, to REST API’s and backend services, NextWave has you covered. Working with modern, open source technology, NextWave builds around tools that allow for rapid application development.
HypeBeast Essentials -G
The drop day is warfare, and it’s best bot win. Thousands are spend on launch item days for designer brands, yet even more is gained from the resale value of limited items. Simple economics, supply and demand.
As an emerging technology bitcoin can be a murky lake to traverse, however with proper tooling, proprietary metrics, aggregated media, and a history of successful trades, NextWave hopes to be a lighthouse in the Bitcoin market.
Contracting & Consulting
NextWave offers affordable consulting to take your business to the next level. From marketing, web design, to SEO, make sure you are staying ahead of everyone else, adapting the NextWave of technology.
Recent Blog Posts
Jack of all trades, master of none. Often better, than a master of one. Adam Savage Master of one When I first started programming, I had figured I would learn python. It was easy enough for a young me to learn. It was powerful and could do a whole lot. I told myself the more time I spent in this language the better I would be. I spent about two years learning python.
Recently while penetration testing a clients server I found a DOS attack via a simple post request. On a page which took text input, as well as a hashing method, and returned the hash string, I was able to DOS the entire server. Starve the CPU The exploit was a simple bash script that made a POST request with the text as testing and the hash function, Argon2. Now one interesting thing to note is exactly how much CPU usage each hash function takes.
As an interpreted language, PHP has the unique problem of disclosing all of its source code. This does not benefit malware developers trying to hide their code. Obfuscation helps, but only to a certain extent. This is to the benefit of security researchers. After finding a nasty infestation on a clients site, I was intrigued by the different ways these malware devs were using the web to defeat modern anti-virus techniques.