PinnedUnmasking Obfuscated JavaScript: A Deep Dive into Modern Scam Techniques Involving Malicious…Decoding the Hidden Threats Lurking in Your Code: How Cybercriminals Use Obfuscation to Exploit Web ApplicationsOct 17Oct 17
Pinned🌟 Tired of Tedious Dotfile Management?Imagine this: It’s 2 a.m., and you’ve just set up your new machine again. Hours of syncing, configuring, and reorganizing dotfiles have…Nov 3Nov 3
PinnedHow the Command Line Transformed My Workflow and Made Me a 10x DeveloperMastering the Command Line: How Automating My Workflows Turned Me into a 10x Developer and Streamlined Cloud DeploymentsSep 16Sep 16
My Ultimate Development Setup: Efficiency, Style, and PortabilityWelcome to an in-depth look at my development setup, a carefully crafted environment that blends efficiency, style, and portability…Dec 10, 2023Dec 10, 2023
pnpm: Streamlining JavaScript Development in Conjunction with Git WorktreeIntroductionNov 26, 2023Nov 26, 2023
Git Worktree: A Boon for Software DevelopersIn the world of software development, Git reigns supreme as the go-to tool for version control. While most of us are familiar with basic…Nov 19, 2023Nov 19, 2023
Published inCoinsBenchTired of setting up a new blockchain solidity project from scratch?Well, you have come to the right place. Just clone any one of these repositories (truffle-template or hardhat-template), make a few…Jun 7, 2022Jun 7, 2022
Published inCoinsBenchWhy choose Cryptocurrencies?FREEDOM. How much of it do we hold?Dec 20, 20212Dec 20, 20212