PinnedPublished inLevel Up CodingDev Retro 2023: Journey in reviewMastering the Art of Consistency ️💙Dec 31, 2023Dec 31, 2023
PinnedPublished inStackademicDev Retro 2022: Journey in reviewAt the state of Ikigai ❤️Jan 3, 2023Jan 3, 2023
Published inInfoSec Write-upsMeta Fined €91 Million for Storing Millions of Facebook and Instagram Passwords in PlaintextWhile researching security vulnerabilities, I learned an important lesson about the risks of storing sensitive data improperly.Oct 273Oct 273
Published inJavaScript in Plain EnglishHow Much HTML, CSS & JavaScript You Need to Know to Get Hired as a Web DeveloperYou’ve been working hard, diving into HTML, CSS, and JavaScript, preparing yourself for that dream developer job. But then, doubt creeps…Oct 16Oct 16
Published inJavaScript in Plain EnglishJavaScript concepts every Node.js developer must masterNode.js is a Javascript runtime environment that has become one of the important standard for building apps. Node remains the leading…Oct 81Oct 81
Published inLevel Up CodingKickstart Hacktoberfest with These Exciting Open Source Projects to Contribute To! 🚀Hey there! 👋 Are you participating in Hacktoberfest?Sep 301Sep 301
Published inAWS in Plain EnglishDocker Explained: A Deep Dive into ContainerizationIn the ever-evolving landscape of software development, Docker has emerged not just as a tool but as a revolution. Imagine a world where…Sep 28Sep 28
Published inInfoSec Write-upsRanveer Allahbadia’s YouTube Channels Hacked: What Happened and What’s Next?In a shocking turn of events, prominent Indian YouTuber Ranveer Allahbadia, known by his channel name BeerBiceps, became the victim of a…Sep 264Sep 264
Published inArtificial Intelligence in Plain EnglishAI News Roundup: Is OpenAI’s o1 a Game-Changer? New Use Cases ExploredOpenAI’s latest model, o1, has been making waves in the AI community. While initial reactions were mixed, it’s now clear that o1 offers…Sep 221Sep 221
Published inInfoSec Write-upsWill Software Updates lead to Cyberattacks ?Software updates are critical for keeping systems functioning by fixing known vulnerabilities, so how can they contribute to cyberattacks…Sep 192Sep 192