Pascal Obiwumma

5.3K posts

Pascal Obiwumma banner
Pascal Obiwumma

Pascal Obiwumma

@Pascal_FTM

Frontend Dev || Fullstack Soon || JavaScript || Crypto Futures Trader || ICT || »»Building My Portfolio. Got any ideas? DM««

Nigeria Entrou em Ocak 2023
600 Seguindo596 Seguidores
Tweet fixado
Pascal Obiwumma
Pascal Obiwumma@Pascal_FTM·
Hello everyone👋 My name is Pascal. I'm a crypto futures trader as well as a web developer in the making. Currently working on my Technical analysis and frontend development. I'll be sharing my journey in becoming a successful trader and developer Let's connect🙇
English
10
11
92
2.6K
sheCodez
sheCodez@sheCodezArt·
@Pascal_FTM I'm not, I'm better, bigger, stronger... Chat just was limited to all anime! 🤣 When you say broken, you have no idea 😅
English
0
0
0
7
sheCodez
sheCodez@sheCodezArt·
Prompt: "... One thing buddy. Based on our discussions for over 3 years now, all I do, all I say, my folly, my energy, my preferences, my dislikes if any, and all and all, what anime character am I? Which matches my person? Or is there none?! 😂" Behold, I'm a man guys! 😂
sheCodez tweet media
Zoe.js☠︎⥀@ZoeAlterEgoCode

English
4
1
6
56
Pascal Obiwumma retweetou
MITCH VIBEZ
MITCH VIBEZ@Mitchmiller237·
Na me be Merlin today Still my day +1 Man don de old wetin no good
MITCH VIBEZ tweet mediaMITCH VIBEZ tweet mediaMITCH VIBEZ tweet media
English
5
4
9
118
𝐓𝐘
𝐓𝐘@dev_TEMITAYO·
Has the algorithm been treating you well?
English
2
0
3
68
random guy on the internet
random guy on the internet@KharayKrayKray·
Nigerian women home and abroad all have the tendency to become prostitutes… see how that sounds? Dullard
_thekeme@Mystery_Girley

@namjoon_hottie Nigerian men home and abroad all have the tendency to commit rape. The ones who have not done it yet just haven’t gotten the opportunity. Gosh Nigeria is a zoo!!! Just look at them🤦🏽‍♀️. This is so heartbreaking. Not one man stopped them!

English
3
2
15
317
Pascal Obiwumma retweetou
Emmy Codes 🪖🚀👨‍💻
API Security Best Practices API security refers to the practices and mechanisms used to protect APIs from unauthorized access, abuse, and data breaches. It ensures only trusted users and systems can interact with backend services. Secure APIs protect sensitive data and maintain system integrity. Why API Security Is Important - APIs expose backend services to external applications - Poorly secured APIs can lead to data leaks and system compromise - Many modern applications rely heavily on APIs for communication - Protects user data, financial transactions, and business logic Authentication and Authorization - Always require authentication before granting API access - Use strong authorization mechanisms to control user permissions - Implement token-based authentication such as JWT - Ensure role-based or permission-based access control Use HTTPS for Encryption - Encrypt all API communications using HTTPS - Prevents attackers from intercepting sensitive data - Protects login credentials, tokens, and user information - Avoid transmitting sensitive data over unencrypted connections Input Validation - Validate all incoming data before processing it - Prevent malicious inputs such as SQL injection or script injection - Enforce strict data types and formats - Reject unexpected or malformed requests Rate Limiting and Throttling - Limit the number of requests a client can send - Prevent brute-force attacks and API abuse - Protect backend resources from overload - Example: limit requests per minute per user or IP API Keys and Tokens - Use API keys to identify applications accessing your API - Rotate API keys periodically - Store keys securely and avoid exposing them publicly - Combine API keys with stronger authentication methods Secure Error Handling - Avoid exposing internal system details in error messages - Do not reveal database queries or stack traces - Return generic error messages to clients - Log detailed errors internally for debugging Implement Access Control - Restrict access to sensitive endpoints - Apply least-privilege access principles - Ensure users only access resources they own or are permitted to use Monitoring and Logging - Log API activity for auditing and investigation - Monitor unusual traffic patterns - Detect suspicious behavior early - Use monitoring tools to track request metrics and failures API Versioning - Maintain different versions of APIs when changes are made - Prevent breaking existing client applications - Secure deprecated versions before removing them Protection Against Common Attacks SQL Injection - Sanitize inputs and use parameterized queries Cross-Site Scripting (XSS) - Validate and encode user-generated content Denial of Service (DoS) - Implement rate limiting and traffic filtering Best Practices Summary - Always authenticate and authorize API requests - Encrypt communication using HTTPS - Validate and sanitize all inputs - Implement rate limiting and monitoring - Protect API keys and tokens securely - Log and analyze API usage patterns Stay safe out there — secure APIs = secure apps!
Emmy Codes 🪖🚀👨‍💻 tweet media
English
2
5
11
220
Pascal Obiwumma
Pascal Obiwumma@Pascal_FTM·
@0xfeMMANUEL Sometimes Ego gets the better of those with a little more knowledge than others. sigh
English
1
0
1
6
Emmanuel not Devin
Emmanuel not Devin@0xfeMMANUEL·
I kinda feel bad for Nigeria tech twitter, you're trolling a person for not knowing a thing? There's always better ways to correct a person, with kindness
English
2
0
6
56
no-nonsense b!tch
no-nonsense b!tch@Pymathpro·
I needed a break yesterday #day5 mastering Japanese I will return to the Hiragana now. First, I will revise Second, I will learn to write Third, I will game Have a nice day, Joes and Jacks 👋
no-nonsense b!tch@Pymathpro

#day4 mastering Japanese. Learning is slow but it's better than a NO GM, fellas 👋

English
2
0
3
25
Pascal Obiwumma retweetou
Spectra☢️
Spectra☢️@Spectra010s·
@Pascal_FTM Ya using mongoose haven't had a project where I will use to learn it
English
1
0
1
4