Oct 29, 2021Master Google in 3 minutesLike a Software Developer Google is everywhere. Google is in everything. And the most used Google product is the search. Every day billions of queries pass through their servers. And millions of people get answers. And there are millions of answers that didn’t answer the query. …Google3 min readGoogle3 min read
Sep 10, 2021How to Choose a Developer Path in 5 MinutesThere are multiple aspects to consider when starting off as a new developer. The question we will tangle this time is, should you go wide or should you go deep? To further explain, should you learn multiple programming languages on a surface level or should you dive really deep into…Junior Developer3 min readJunior Developer3 min read
Sep 9, 2021HackTheBox or TryHackMe? And some tips to help you get started in 6 minutes or less.If you have seen my Hacking repository or follow me on Twitter you will know that I have dipped my toe into infosec. There are two commonly known websites when it comes to showing off your skills as a developer. For newcomers to tech and developers in general these two…Hackthebox5 min readHackthebox5 min read
Apr 5, 2021Socket ProgrammingLast time we talked about Inter Process Communications. While it was a good list, all the methods we discussed were mainly for communication between two processes running on the same machine. This time we will dip our toe into Socket Programming. Wikipedia defines sockets as, «A software structure within a…Sockets5 min readSockets5 min read
Mar 29, 2021Inter Process Communications are…First off, as a disclaimer, I need to inform you that we will be talking about POSIX systems. While all operating systems have these, the implementation can be different. As we go along I will be talking about the level of persistence. There are three levels of persistence: Process level…Ipc5 min readIpc5 min read
Mar 15, 2021Protecting Yourself On The NetThere are many ways third parties can invade your privacy while you are browsing through the net. There are two main aspects to this discussion. One of them is about internal risks and the other is about external risks. The internal risks include social engineering someone to get sensitive data…Tor5 min readTor5 min read
Mar 8, 2021What are some ways to use DLL libraries?DLL libraries are pre-compiled function libraries that will be loaded and unloaded from memory on runtime by demand. For them to be usable by an executable, they need to be linked to the executable at the linker time. …Dll1 min readDll1 min read
Mar 1, 2021How does HTTPS work?Most people see HTTPS services as some kind of a black box, which is untrue. HTTPS relies on the RSA encryption system. The RSA is a different post but the short version is you have two complementary keys, one public and one private. …Https3 min readHttps3 min read
Mar 1, 2021What is RSA? How does it work?RSA is a cryptosystem for secure data transfer over the net. The acronym comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who published it in 1977. As with all great creations, there was a little bit of wine involved in the making of this. RSA is…Rsa4 min readRsa4 min read
Feb 22, 2021Do you need to switch over to Linux to become a developer?Since this will be the first writing I have ever done on subjects of my profession, I believe it makes sense to talk about some tools and technologies. First off, let’s talk about Linux distributions. Whatever tool I might mention in the future has a Linux equivalent. Or, it is…Linux2 min readLinux2 min read