Yours In ClioLetters to MyselfI woke up today to a letter from myself, written six months ago via FutureMe.com. This has become a habit of mine — writing letters to my…20h ago
InITNEXTbyMykolaDemystifying OTPs: the logic behind the offline generation of tokensHello there! Another evening, on my way back home, I decided to check the mailbox. I don’t mean my email inbox, but the old-school actual…2d ago
David RichardsSSE (Server-Sent Events) Using A POST Request Without EventSourceThis article will explain how to receive SSE from your frontend using a HTTP POST request, which is not supported by EventSource. Most…Feb 10, 20239Feb 10, 20239
AnusoosanbabyUnderstanding Joins in SQL: Maximum and Minimum RowsWhen working with SQL, joining tables is a fundamental operation to combine data from two or more tables based on a related column. The…Jun 13Jun 13
Yours In ClioLetters to MyselfI woke up today to a letter from myself, written six months ago via FutureMe.com. This has become a habit of mine — writing letters to my…20h ago
InITNEXTbyMykolaDemystifying OTPs: the logic behind the offline generation of tokensHello there! Another evening, on my way back home, I decided to check the mailbox. I don’t mean my email inbox, but the old-school actual…2d ago
David RichardsSSE (Server-Sent Events) Using A POST Request Without EventSourceThis article will explain how to receive SSE from your frontend using a HTTP POST request, which is not supported by EventSource. Most…Feb 10, 20239
AnusoosanbabyUnderstanding Joins in SQL: Maximum and Minimum RowsWhen working with SQL, joining tables is a fundamental operation to combine data from two or more tables based on a related column. The…Jun 13
Fabian OwuorThe Problem with OTPs: How Hackers Are Exploiting Them to Scam PeopleOne-time passwords(OTPs) are often hailed as a simple yet effective layer of security, especially in two-factor authentication (2FA)…Dec 5
InIT Security In Plain EnglishbyamUnmasking the Undead: Understanding and Eliminating Zombie Processes in LinuxZombie processes are a common occurrence in Unix-like operating systems, including Linux. Despite their spooky name, zombie processes are…Jun 18