Handling form validation in SveltekitTLDR; Full code is here or if you want to see with zod validation.Aug 15, 2023Aug 15, 2023
Refactoring a complex concurrent program in Golang — Lessons learntSo this is going to be a short story of how I ended up refactoring some rather complicated Golang logic suffering from a race condition…Jun 6, 2023Jun 6, 2023
In general you will want the following from your errors:- What happened: e.g. disk full, socket closed etc.Jan 15, 20231Jan 15, 20231
These tips are nice, I didn't know about the private hack!!What I would say to people tho is don't bend your application into a pretzel by trying to maintain backwards compatibility unless you…Jan 14, 2023Jan 14, 2023
The problem with AWS lambda and lambda architecture is that you have to create 2 different layers…Time: you cannot run the job normally for more than 15 minutes. It needs more than that to split the file, run many functions and maintain…Nov 12, 20221Nov 12, 20221
Published inInfoSec Write-upsNetworking basics: What is the Address Resolution Protocol and how to hack itARP introduction and ARP spoofing/proxy attack tutorial using PythonMar 4, 2020Mar 4, 2020
Setting up TypeScript in a Mono-RepoIn this article I will be showing you how to set up node TypeScript to be used across multiple packages in a lerna + yarn workspaces…Feb 2, 20203Feb 2, 20203
Sharing a an environment file across your Mono-RepoIt can be useful to have a centralized config containing all your environment variables to avoid code duplication and improve re-usability…Feb 2, 20202Feb 2, 20202
Introduction to hacking web applicationsLearn about the core defence mechanisms employed by web applications and the common attacks that exploit weaknesses in these methods…May 9, 20191May 9, 20191
Published inInfoSec Write-upsBGP: The weak link in the internet! What is BGP and how do hackers exploit it?The best way to explain BGP is it’s the people in the pub who swear Dave is Dave as they’ve met him before. But sometimes they’re drunk…Feb 3, 2019Feb 3, 2019