Categories

Browse articles by topic. From low-level engineering to high-level strategy.

Browse by Date

Algorithms

An algorithm is a finite sequence of well-defined, computer-implementable instructions, typically to solve a class of problems or to perform a computation. They are the fundamental building blocks of any piece of software.

Key aspects include:

  • Efficiency: How well it performs in terms of time and memory ($O(n)$).
  • Correctness: Whether it produces the correct output for all valid inputs.
  • Design Patterns: Common approaches like divide and conquer, dynamic programming, or greedy algorithms.
The Evolution of Password Security: From Basic Storage to Argon2
featured

The Evolution of Password Security: From Basic Storage to Argon2

July 18, 2025

SHA256 and the Length Extension Attack
July 11, 2025

SHA256 and the Length Extension Attack

How to Use a Reverse Trie for Fast Disposable Email Domain Detection
December 5, 2022

How to Use a Reverse Trie for Fast Disposable Email Domain Detection

Authentication

Authentication (Auth) is the process of verifying that an individual or system is who they claim to be. It is the first step in any security process and is distinct from authorization (what a user is allowed to do).

Common methods include:

  • Something you know: Passwords or PINs.
  • Something you have: Security tokens, mobile phones (for OTPs).
  • Something you are: Biometrics like fingerprints or facial recognition.
  • Multi-Factor Authentication (MFA), which combines two or more of these methods.
The Evolution of Password Security: From Basic Storage to Argon2
featured

The Evolution of Password Security: From Basic Storage to Argon2

July 18, 2025

SHA256 and the Length Extension Attack
July 11, 2025

SHA256 and the Length Extension Attack

GitHub App and OAuth ~ Disjointed flow
April 28, 2022

GitHub App and OAuth ~ Disjointed flow

OAuth popup ~ Practical Guide
April 27, 2022

OAuth popup ~ Practical Guide

Git is a free and open-source distributed version control system designed to handle everything from small to very large projects with speed and efficiency. Created by Linus Torvalds, it has become the de facto standard for modern software development.

Core concepts include:

  • Repositories (.git): The database tracking all changes.
  • Commits: Snapshots of your files at a specific point in time.
  • Branches: Independent lines of development.
  • Merging & Rebasing: Combining changes from different branches.

Automation

Automation is the application of technology, programs, and robotics to perform tasks that were previously done by humans. In software development and IT, it is crucial for creating efficient and scalable systems.

Key areas include:

  • CI/CD Pipelines: Automating the build, test, and deployment of software.
  • Infrastructure as Code (IaC): Using code to provision and manage infrastructure.
  • Robotic Process Automation (RPA): Automating routine business processes and user interactions.
Automatic Subtitles with Whisper and Remotion: A Complete Guide
featured

Automatic Subtitles with Whisper and Remotion: A Complete Guide

July 16, 2025

Run n8n and SearXNG Locally with Docker: Build Your Own No-Code AI Playground
April 20, 2025

Run n8n and SearXNG Locally with Docker: Build Your Own No-Code AI Playground

Free Online Text to Speech Generator - SpeechStudio.ai
April 18, 2025

Free Online Text to Speech Generator - SpeechStudio.ai

Cyber Security

Security in the digital realm encompasses all measures taken to protect data, networks, and computer systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It’s a broad field aimed at ensuring confidentiality, integrity, and availability (the “CIA Triad”).

Topics often covered are:

  • Vulnerability Assessment: Identifying weaknesses in systems.
  • Penetration Testing: Simulating attacks to find exploitable flaws.
  • Secure Coding Practices: Writing code that is resilient to common attacks like SQL Injection and XSS.
  • Network Security: Protecting the underlying infrastructure with firewalls, VPNs, and monitoring.
The Evolution of Password Security: From Basic Storage to Argon2
featured

The Evolution of Password Security: From Basic Storage to Argon2

July 18, 2025

SHA256 and the Length Extension Attack
July 11, 2025

SHA256 and the Length Extension Attack

Throttling Explained: A Guide to Managing API Request Limits
December 4, 2024

Throttling Explained: A Guide to Managing API Request Limits

The Web category covers all aspects of creating and maintaining websites and web applications. It is traditionally split into two main areas, though the lines are increasingly blurred:

  • Front-End: The client-side, what the user sees and interacts with in their browser.
    • Technologies: HTML, CSS, JavaScript, and frameworks like React, Angular, or Vue.
  • Back-End: The server-side, responsible for logic, databases, and authentication.
    • Technologies: Languages like Node.js, Python, PHP, Java, and databases like PostgreSQL or MongoDB.
The Evolution of Password Security: From Basic Storage to Argon2
featured

The Evolution of Password Security: From Basic Storage to Argon2

July 18, 2025

Animated Transitions in MPAs with the View Transitions API
July 13, 2025

Animated Transitions in MPAs with the View Transitions API

Intersection Observer: Smooth Animations Without Blocking the Page
July 9, 2025

Intersection Observer: Smooth Animations Without Blocking the Page

Run n8n and SearXNG Locally with Docker: Build Your Own No-Code AI Playground
April 20, 2025

Run n8n and SearXNG Locally with Docker: Build Your Own No-Code AI Playground