Blogs
AWK: The Swiss Army Knife for Text Processing
The powerful text processing language for data manipulation and analysis
Understanding Webhooks and Their Role in Modern Web Development
Implement secure webhooks for efficient content revalidation and updates.
Why You Should Use Formats Like WebM, WebP & Ogg in Your Web Applications
Faster sites with WebM, WebP, Ogg. Optimize media, boost SEO!
Using .env Files: Risks of Hardcoding Secrets
Secure your apps: Use .env files and avoid hardcoding secrets!
Understanding ReDoS (Regular Expression Denial of Service) Attacks
ReDoS Attacks: Examples, Metrics & Prevention Tips
Orphan Your Children (Processes): Using nohup and disown
Orphan Your Processes: nohup & disown in Linux
Commit Like a Pro: Signing Your Commits with an RSA Key
Secure your git commits with RSA key signing
What is A JWT and What it Ain't
JWT is not encryption! Don't pass them passwords...
Can We Trust Open Source Binaries? A Simple Guide with GitHub Workflows
How can I trust the binary files if I cannot read their content?
Two Types of Developers: Those Who Know Regex and Those Who Don't
What I can actually do with regex? Other than phone number validation...
How I Know You Read This
Lets measure blog read counts of your blogs
Rediscovering Music: My Journey Into Vinyl and Escaping the Digital Frenzy
Step away from the digital chaos and dive into the charm of vinyl records.