Blog /Technology

Building multifunctional websites and web applications is hardly an easy task. We support ourselves in this process with various programming languages and tools.

We are the largest and best-known company dealing with creating and supporting Drupal-based websites in Poland. Our areas of expertise also include Symfony, PHP, ReactJS and front-end development. In our endeavours, we also use a variety of other software solutions, such as PHPStorm, Jenkins and Docker.

We are happy to share our experiences, describing the process of work on building and developing websites and applications at Droptica. Thanks to SCRUM and the right tools such as Slack and Jira, we ensure seamless communication between the team and the client. We systematically improve or change the software we use in order to automate repetitive actions and speed up the development work.

You can learn more about the ins and outs of our work thanks to our extensive blog articles, or you can find out what benefits we can offer you thanks to our Case Studies.

Pentesters use various tools during an audit to save time and find as many security errors as possible. Some activities can’t be done manually within a reasonable time. An example is the detection of all subpages of a website. There are paid and free tools that allow this to be done. Vulnerability scanners are also created and actively developed. They include solutions that support pentesting.

In the developer's work, it's important to write good-quality code efficiently. We may try to handle everything by ourselves or use the tools that facilitate and accelerate our work. There are many available solutions on the market, so we've decided to make the choice easier for you and suggest what to pay attention to when looking for this type of software, and which specific systems you should be interested in.

DevOps is undoubtedly one of the most popular terms in the IT world. Among the prerequisites for working as a DevOps engineer are the skills in the field of software development and knowledge of its implementation processes. Due to the wide range of technologies and the need for having specialist knowledge, it's essential to choose the right tools for work.

In the previous parts, we focused on Drupal configuration and the overview of modules and libraries. In the third part of the series on conducting a security audit, we'll focus on the overview of custom modules and themes. We'll perform an audit of the project repository, identify and analyze the elements worth paying attention to during the auditing process.

In the first part of the series on Drupal security audits, we described how to review modules and libraries. However, modules and dependencies will be useless if any user will be able to see our custom routing where we display all the client information. Therefore, in this article we'll look at the configuration of our website. Correct configuration is one of the key elements affecting security.

A security audit is the process of identifying security threats that can lead to unauthorised access to content, data leaks, bypassing the security, and other dangers. In the first part of the series on conducting a security audit, we'll focus on the overview of the Drupal module versions that we use at Droptica for this purpose, as well as on PHP and JavaScript libraries.

MG 1202 Blur

Need a team of Drupal and PHP web development experts?