PinnedHit ShiroyaAnother year older, another page in my bucket list!I was supposed to publish this article in March, as I turned 23 during that month and reached the midpoint of my bucket list. Initially, I…Apr 26Apr 26
PinnedHit ShiroyaIs it possible to hack Instagram account ?Have you ever heard someone claim that their Instagram account got hacked? In this article, I’ll delve into whether it’s possible to hack…Feb 14Feb 14
PinnedHit ShiroyaIs Linux still safe if someone manages to crack the root password?We are aware that on any Linux or kernel-based OS, if we gain physical access to the machine, we can potentially crack the root password…Feb 11Feb 11
Hit ShiroyaSpread vs Rest operator in JavascriptIn JS we use this ‘…’ notation and same can be used in Rest as well as in Spread.3d ago3d ago
Hit ShiroyaUnderstand OAuth 2.0We use a lot of social media applications and music player applications that ask us to set up our own account on their platform to track…Feb 12Feb 12
Hit ShiroyaControl Services and Boot Process — LinuxIn this article, I will discuss system daemons and network services initiated by the systemd service and socket units. Additionally, I…Feb 11Feb 11