Publishing Java SpringBoot Library in JitPack

Pre-requisites A Github account and a new project repository which will contain the codes of our library. Jitpack Account where we will be publishing our library.   Create the Library The first thing you need to do is to create your library project. For this tutorial, we are going to… Read More!

181 Views No comments yet October 9th, 2020 by

Deploy React Application in Netlify

Netlify is a web development platform that can be used to host your React, Php, Python, Angular application. In this tutorial, we are going to publish our React application in Netlify. We are not going to tackle how to create a React Application in this tutorial, but if you want… Read More!

178 Views No comments yet October 9th, 2020 by

10 Tips to Junior Programmers: Advice from a self-taught Programmer

I have been mentoring new hires for some time now and the most common question that has been asked of me was “What are some of your advice to programmers that are just starting out?” So I realize that It is time I share some. Over time, I managed to… Read More!

1719 Views No comments yet December 30th, 2019 by

MFRC522 RFID Read and Write Data in Specific RFID Block

In this tutorial, we will learn how to read and write data to a specific RFID block using MFRC522 and Arduino. If you are storing a person’s first name and surname, then this tutorial is what you are looking for. You can also read the data stored in ID by… Read More!

1831 Views No comments yet September 1st, 2019 by

Create a BadUSB Rubber Ducky using Arduino

Rubber Ducky is the most popular tool to inject keystrokes on a victim’s computer at lightning speed. Masked as a regular USB device, Rubber Ducky acts like a keyboard (Human Interface Device) and automates key presses. It executes command upon plugging in the USB device. It is very effective because,… Read More!

3730 Views 2 comments August 21st, 2019 by

Social Media Phishing with Captive Portal using NodeMcu

Phishing is a criminal act of deceiving other people into sharing their sensitive information like credit card numbers or account credentials. Usually, it is carried out by sending victims fake URLs which imitate a legitimate website such as social media accounts, bank login pages, and more. In this demonstration, we… Read More!

1636 Views 3 comments July 21st, 2019 by

How a new hire Programmer gained Confidence at work

It has been months since I started my work in the company and we had new hires coming in. In the first week of work, they often contemplate what their value was because they have not accomplished something yet. It is prevalent in today’s workforce. I was once in their… Read More!

1480 Views No comments yet July 15th, 2019 by

Your mistake does not define who you are as a Developer

I was new at work and I have introduced a bug in production which took time to fix. I have made a silly mistake in removing a line of code which causes not sync data in production. It was later found after 3 months. It is kinda depressing to see… Read More!

1470 Views No comments yet July 14th, 2019 by

Scan WordPress site Vulnerabilities using WPScan

WPScan is a tool we can use to scan the WordPress websites for security flaws. It is free for non-commercial use. It is important to scan your WordPress website for vulnerabilities because we do not want to lose countless hours of work writing blog posts. In this tutorial, we only… Read More!

1493 Views No comments yet July 14th, 2019 by

Find target Internet activity across Social Networks using Sherlock

When gathering our target internet activity on the internet, Sherlock is a great tool we can easily use to collect opensource intelligence (data that are produced from publicly available information). The downside of open-source intelligence, whilst can be used by security professionals, so does threat actors. With a single clue,… Read More!

1393 Views 2 comments July 13th, 2019 by