Archives
All the articles I've archived.
-
How HTML, CSS, and JavaScript Journey Through the Network and Get Rendered in the Browser
The intricate dance of HTML, CSS, and JavaScript is at the heart of every website and web application. These technologies form the foundation of web development. However, how these comp…
-
When and Where to Use Generator Functions - Practical Use Cases
Now that we've explored the mechanics of generator functions, it's essential to understand where they can be utilized best. Despite their power, they are not a one-size-fits-all solution. But, for ce…
-
Qwik - The Next Evolution in Frontend Frameworks
Introduction In the ever-evolving landscape of web development, a new player has emerged with the promise of revolutionizing how we think about building web applications - Qwik. This framewor…
-
Exploring the Power of Generator Functions in JavaScript
JavaScript has evolved significantly over the years, enabling more efficient, streamlined coding through ES6+ features. One such feature that has dramatically transformed the way we handle asynchrono…
-
Symbol Keyword in JavaScript
JavaScript, as a programming language, continues to evolve over time with various updates, introducing features aimed to tackle the challenges that developers often face. One such feature is the intr…
-
Understanding Closure in JavaScript and Its Importance
Now that we've explored the mechanics of generator functions, it's essential to understand where they can be utilized best. Despite their power, they are not a one-size-fits-all solution. But, for ce…
-
Essential JavaScript Design Patterns - Building Blocks of Web Applications
JavaScript, the lingua franca of the web, has long shed its reputation as a rudimentary scripting language. Today, it's ubiquitous across web, mobile, and server-side development, powering some of th…
-
Doing Internalization in Angular
Creating applications that can effortlessly transcend language barriers has become imperative in our increasingly globalised world. Internalization, also known as internationalization or i18n, is the…
-
Understanding the Difference - Libraries vs SDKs in Software Development
In the realm of software development, the lexicon is filled with terms that are often used interchangeably but have nuanced differences. Two such terms that are crucial to understand are 'library' an…
-
The Bangladesh Bank Heist - A Lesson in Cybersecurity
The Bangladesh Bank heist in February 2016 was one of the most infamous cybercrimes in history. Criminals attempted to steal nearly $1 billion from the central bank of Bangladesh, successfully making…
-
The Enigmatic World of REvil - Unmasking the Hacker Group
In the dark recesses of cyberspace, infamous hacker groups with notorious reputations exist. One such group, REvil, has become synonymous with high-profile cyberattacks and ransomware campaigns. Form…
-
Unveiling Global State Management in Angular using Signals with LocalStorage
Are you looking at how to do state management using angular signals? You came to the right place. State management is an indispensable aspect of any web application. Proper state management ensures…
-
The SolarWinds Hack - Unraveling the Truth and Preventing Future Attacks
In December 2020, the world witnessed one of the most sophisticated cyberattacks in history - the SolarWinds hacking. This blog post explores the events that transpired and how such an incident could…
-
Writing an Accessible Angular Application - A Comprehensive Guide
In the realm of software development, unit tests are indispensable tools that enable developers to verify the correctness of individual components within a system. Among a multitude of testing framew…
-
Zero-Day Vulnerability in a Nutshell - Understanding the Threat & Safeguarding with Auth0
In the ever-evolving digital landscape, cybersecurity is of paramount importance. One of the most potent threats companies and individuals face is zero-day vulnerability. In a nutshell, a zero-day vu…
-
A Quick Overview of Supply Chain Attacks
Supply chain attacks have risen recently, causing significant concern among businesses and organizations worldwide. These attacks exploit vulnerabilities in the relationships between businesses, supp…
-
Microservices Best Practices - A Guide to Successful Application Design
As the world of software architecture evolves, Microservices have emerged as a game-changing paradigm, encouraging developers to decompose monolithic applications into smaller, independent services.…