Category: Blog
Total: 153 Posts
Posts of Category: Blog
  1. Hashing Passwords in Python with BCrypt

    Introduction Storing passwords securely should be imperative for any credible engineer. Plain text passwords are extremely insecure - you shouldn't even bother considering storing them a plain format. It's enou...Learn More
    PythonSecurity
  2. How to Parse Command Line Arguments in Bash

    Introduction Bash scripts take in command-line arguments as inputs both sequentially and also, parsed as options. The command-line utilities use these arguments to conditionally trigger functions in a Bash scri...Learn More
    LinuxUnixbashcommand-line
  3. Pimp my Terminal - An Introduction to "Oh My Zsh"

    Introduction Using a terminal can be a bit of an intimidating experience in the beginning - but after you get used to it, it can boost your productivity in ways you couldn't imagine and can become quite a pleas...Learn More
    LinuxUnixshellbashzsh
  4. Checking Vulnerabilities in Your Python Code with Bandit

    Introduction As developers, we're encouraged from the start of the journey to write clean code. Equally as important, but less talked about is writing and using secure code. In Python projects, we typically ins...Learn More
    PythonSecuritytesting
  5. Spring Security: In-Memory Invalidation of JWT Tokens During User Logout

    Introduction As technology evolves and becomes more prevalent - including the evolution of large-scale service-oriented architectures, managing web security becomes more and more complex. There are many more ed...Learn More
    JavaSecuritySpringSpring Bootspring securityjwt
  6. How to Use the Rsync Command in Unix

    Introduction The digital revolution has changed our lives in many ways. Nowadays, our picture albums, music collections, bookshelves etc. are all digital - binaries written on a disk. Our life and work are shar...Learn More
    LinuxUnix
  7. Linux: Display File Properties via Terminal

    Introduction We commonly need and want to know more about the files and directories that we are working with. Most people know one of the ways, which is simply to Right Click > Properties on the wanted folder o...Learn More
    LinuxUnix
  8. Guide to Understanding chmod

    Guide to Understanding chmod Introduction File access permissions and security are at the heart of *nix-based operating systems. File objects can belong to users and/or groups, and at times they need to be shar...Learn More
    LinuxUnixbash
  9. Course Review: Python for Data Science and Machine Learning Bootcamp

    **Course Review: Python for Data Science and Machine Learning Bootcamp** Before we get started it would be helpful to know what data science and machine learning actually are. So in case you don't know, here ar...Learn More
    PythonMachine LearningReviewudemy
  10. Course Review: The Complete React Native and Redux Course

    **Course Review: The Complete React Native and Redux Course** Have you wanted to learn React Native for a while and been wondering what online course or tutorial to take? Have you been working with JavaScript, ...Learn More
    JavaScriptReviewReactudemyreact native
  11. Course Review: The Complete Java Masterclass

    **Course Review: The Complete Java Masterclass** Preface The word "Java" has become so ubiquitous that even non-technical folks seem to be aware of it these days. Thanks to the tremendous popularity of the prog...Learn More
    JavaReviewudemy
  12. Course Review: The Web Developer Bootcamp

    **Course Review: The Web Developer Bootcamp** It would be difficult to be a developer these days and not have at least a limited understanding of the web and it's massive popularity. As many of you probably alr...Learn More
    WebsiteJavaScriptReviewudemy