Cors: The digital condom for website interactionsThe Accidental Birth of a Digital DefenderDec 13, 2024Dec 13, 2024
Cross-Origin Resource Sharing (CORS) vulnerabilities in web applications TheoryIntroductionDec 12, 2024Dec 12, 2024
Redis Comprehensive Guide: From Installation to Express IntegrationI’ve created a comprehensive guide covering some of the interesting topics you’ll need as dev you could save it as a cheat sheet, with…Dec 6, 2024Dec 6, 2024
Web Authentication Mechanisms: From Sessions to TokensAuthentication has evolved significantly in web development, from the early days of session-based systems to the modern stateless token…Nov 17, 2024Nov 17, 2024
Cache Me if You Can: Caching SimplifiedImagine you run a coffee shop called Byte Brew. Every day, you get hundreds of orders for the same popular drinks. You notice that some…Oct 30, 2024Oct 30, 2024
A Practical Guide to Python Async ProgrammingAsynchronous programming is crucial when dealing with tasks that can take a long time to complete, such as file I/O, network requests, or…Oct 14, 2024Oct 14, 2024
The Time I Tried Clerk Webhooks to Persist Users in MongoDB (and What Went Wrong)Introduction: A Dream outcome faced by challengesOct 1, 20241Oct 1, 20241
Server Components Vs Client ComponentsSometimes in coding, it’s amazing how the smallest mistakes can cause the biggest headaches. Recently, I found myself repeatedly running…Sep 5, 2024Sep 5, 2024
Application Servers and Web Servers: The Internet’s Unique Duo(part7)IntroductionAug 21, 2024Aug 21, 2024
Token-based authentication Vs OAuth(part 6)Hey there, fellow code enthusiasts! It’s me again, back with another tale from my frontend adventure. Today, we’re diving into a topic I’ve…Jul 24, 2024Jul 24, 2024