Publishing Java SpringBoot Library in JitPack
Pre-requisites A Github account and a new project repository which will contain the codes of our library. Jitpack Account where we will be publishing our library. Create the Library The first thing you need to do is to create your library project. For this tutorial, we are going to… Read More!
181 Views No comments yet October 9th, 2020 by cedcraftscodesDeploy React Application in Netlify
Netlify is a web development platform that can be used to host your React, Php, Python, Angular application. In this tutorial, we are going to publish our React application in Netlify. We are not going to tackle how to create a React Application in this tutorial, but if you want… Read More!
178 Views No comments yet October 9th, 2020 by cedcraftscodes10 Tips to Junior Programmers: Advice from a self-taught Programmer
I have been mentoring new hires for some time now and the most common question that has been asked of me was “What are some of your advice to programmers that are just starting out?” So I realize that It is time I share some. Over time, I managed to… Read More!
1719 Views No comments yet December 30th, 2019 by cedcraftscodesMFRC522 RFID Read and Write Data in Specific RFID Block
In this tutorial, we will learn how to read and write data to a specific RFID block using MFRC522 and Arduino. If you are storing a person’s first name and surname, then this tutorial is what you are looking for. You can also read the data stored in ID by… Read More!
1831 Views No comments yet September 1st, 2019 by cedcraftscodesCreate a BadUSB Rubber Ducky using Arduino
Rubber Ducky is the most popular tool to inject keystrokes on a victim’s computer at lightning speed. Masked as a regular USB device, Rubber Ducky acts like a keyboard (Human Interface Device) and automates key presses. It executes command upon plugging in the USB device. It is very effective because,… Read More!
3730 Views 2 comments August 21st, 2019 by cedcraftscodesSocial Media Phishing with Captive Portal using NodeMcu
Phishing is a criminal act of deceiving other people into sharing their sensitive information like credit card numbers or account credentials. Usually, it is carried out by sending victims fake URLs which imitate a legitimate website such as social media accounts, bank login pages, and more. In this demonstration, we… Read More!
1636 Views 3 comments July 21st, 2019 by cedcraftscodesHow a new hire Programmer gained Confidence at work
It has been months since I started my work in the company and we had new hires coming in. In the first week of work, they often contemplate what their value was because they have not accomplished something yet. It is prevalent in today’s workforce. I was once in their… Read More!
1480 Views No comments yet July 15th, 2019 by cedcraftscodesYour mistake does not define who you are as a Developer
I was new at work and I have introduced a bug in production which took time to fix. I have made a silly mistake in removing a line of code which causes not sync data in production. It was later found after 3 months. It is kinda depressing to see… Read More!
1470 Views No comments yet July 14th, 2019 by cedcraftscodesScan WordPress site Vulnerabilities using WPScan
WPScan is a tool we can use to scan the WordPress websites for security flaws. It is free for non-commercial use. It is important to scan your WordPress website for vulnerabilities because we do not want to lose countless hours of work writing blog posts. In this tutorial, we only… Read More!
1493 Views No comments yet July 14th, 2019 by cedcraftscodesFind target Internet activity across Social Networks using Sherlock
When gathering our target internet activity on the internet, Sherlock is a great tool we can easily use to collect opensource intelligence (data that are produced from publicly available information). The downside of open-source intelligence, whilst can be used by security professionals, so does threat actors. With a single clue,… Read More!
1393 Views 2 comments July 13th, 2019 by cedcraftscodes