Type something to search...

Blog Posts

Secure Authentication & Authorization Exercises

Secure Authentication & Authorization Exercises

Each exercise includes:Scenario Initial Information Problem Statement Tasks for the student Bonus Challenges for deeper thinking**Section 1: OAuth 2.0 + PKCE

read more
Why AI Replacement of Human Developers is Not Useful

Why AI Replacement of Human Developers is Not Useful

There is much speculation going on on the topic of the date of the fate of jobs in web development, graphic design, and other such positions in technology. People make the argument that the duties of

read more
Managing Multiple Git Identities Per Single User Account

Managing Multiple Git Identities Per Single User Account

If you need to work make changes to code under different identities, there are a few different ways you can approach this. The first solution I saw on many webpages was way too clunky for my taste. It

read more
Operation of a Blog Built with AstroJS Static Site Generator

Operation of a Blog Built with AstroJS Static Site Generator

Once configured, an AstroJS website only involves a small amount of technical skill. It should be entirely possible for someone with minimal experience with the command line, html and CSS to maintain

read more
Multi-Currency Self-Custodial Cryptocurrency Wallets

Multi-Currency Self-Custodial Cryptocurrency Wallets

I decided to take a look at a variety of cryptocurrency wallets for linux and windows. I am a huge beliver in the merits of a self-custodial wallet. No matter how big or transparent the provider, stor

read more
Defining New ASCII Designs For Thomas Jensens Boxes Software

Defining New ASCII Designs For Thomas Jensens Boxes Software

The "Boxes" command line tool takes a block of text and wraps it in one of 50 some frames listed with boxed -l and specified by the user with boxes -d the text can either be piped into boxed or a

read more