fschmidt
fschmidt1739220107

SEO

3 Comments
3
Jugem
Jugem1737651104

Hidden Spyware on your 🤳

9 Comments
3
amargo85
amargo851737465963

How to use assembly to manipulate CPU instructions

7 Comments
3
amargo85
amargo851738774641

🤩 Have you ever thought about winning a Raspberriy Pi?

3 Comments
1
Davidm8624
Davidm86241738454318

SBC's & SBC's

0 Comments
2
amargo85
amargo851738188042

Domain-Driven Design (DDD): concepts and examples

4 Comments
1
amargo85
amargo851737894519

Optimize slow SQL queries in a production system

0 Comments
1
amargo85
amargo851737816435

OSINT (Open Source Intelligence): How to collect information from open sources.

0 Comments
1
amargo85
amargo851737358684

Understanding Buffer Overflow and Its Exploitation

0 Comments
1
Davidm8624
Davidm86241737338067

Community learning 2 lesson 5

1 Comments
1
amargo85
amargo851737215104

How hackers use social engineering to obtain information

0 Comments
2
amargo85
amargo851739465263

What have you done to boost your programming career?

0 Comments
0
amargo85
amargo851739449611

When and why to use GraphQL instead of REST

0 Comments
0
amargo85
amargo851739359558

How WebAssembly can complement or replace JavaScript in certain scenarios.

0 Comments
0
amargo85
amargo851739107955

Describing my next project <part 2>

2 Comments
0
amargo85
amargo851738966933

I know that AI will take the work away from programmers, but you can do something different!

0 Comments
0
amargo85
amargo851738924984

Describing my next project <part 1>

2 Comments
0
amargo85
amargo851738914887

Changes in the dev communities

3 Comments
0
amargo85
amargo851738687210

Exploiting and Mitigating Zero-Day Vulnerabilities

4 Comments
0
amargo85
amargo851738610811

When is it necessary to use the 'base64_encode()' and 'base64_decode()' function

0 Comments
0
amargo85
amargo851738417942

Implement an efficient caching system to reduce the load on the bank

0 Comments
0
amargo85
amargo851738397481

Create a scalable design for high-traffic applications

0 Comments
0
amargo85
amargo851738239399

How advanced programmers monitor security logs to detect attacks

2 Comments
0
amargo85
amargo851738161994

Microservices vs Monoliths: when to use each

1 Comments
0
amargo85
amargo851738069140

Set up a honeypot to detect intruders

0 Comments
0
amargo85
amargo851737979815

How to improve the performance of a website to load in less than 1 second

4 Comments
0
amargo85
amargo851737916820

Do you still believe that programmers (html, css and javascript) find jobs in the job market?

2 Comments
0
amargo85
amargo851737717332

Creating a bot to automate tasks in Linux.

2 Comments
0
amargo85
amargo851737660241

How to exploit and protect against Man-in-the-Middle attacks

0 Comments
0