Setting up CI/CD Pipelines with GitHub Actions

Posted on Mon 15 August 2022 in GitHub Actions • Tagged with Continuous Integration, Continuous Deployment, GitHub Actions

Continuous integration (CI) and continuous delivery (CD) are essential practices in modern software development. These practices allow teams to deliver software faster, with fewer bugs, and with more confidence. GitHub Actions is a powerful tool that can help you automate your CI/CD pipelines and integrate them seamlessly into your …


Continue reading

Pros And Cons Of Using JWT (JSON Web Tokens)

Posted on Sun 24 July 2022 in Auth • Tagged with Auth, identity, Security

JWT (JSON Web tokens) is a great way to implement authentication in your applications, though often it is being treated as a silver bullet for almost every backend project. While JWT provides a lot of benefits while implementing auth, it does come with a price. Anyone who is thinking to …


Continue reading

Django and Machine Learning: Building Intelligent Web Applications

Posted on Sun 19 September 2021 in Django • Tagged with Django, Machine Learning, Intelligent Web Applications

Machine learning and artificial intelligence (AI) are rapidly transforming the way we build and interact with web applications. By leveraging the power of machine learning algorithms, developers can build intelligent applications that can learn from user behavior, adapt to changing environments, and make data-driven decisions in real-time.

Django is a …


Continue reading

Few terms in C++

Posted on Sat 24 August 2019 in Programming

Howdy Coders!

Well, today we will learn about a few terms related to File Handling in C++.

Stream :- A sequence of bytes

File: A collection of data or information stored on some media with some specific name is called file.

Text File :- The file which stores data or information in …


Continue reading

MD5 Hashing using C#

Posted on Sat 24 August 2019 in C# • Tagged with C#, Programming

Its common now a days that all the passwords are being encrypted in order to prevent data theft. So the passwords are being encrypted, the most common and most secure encryption method is MD5 hashing.
MD5 hashing stands for Message Digest algorithm 5. The idea of MD5 algorithm is to …


Continue reading

[CHEAT-SHEET] List of Important IRC Commands

Posted on Thu 14 June 2018 in Linux • Tagged with IRC

While you start using IRC, it becomes very essential to do certain tasks. To ensure yours tasks are carried out smoothly, you must know the commands which may come handy. So, today we've compiled here a list of IRC Commands that would come handy doing different tasks in IRC.

Changing …


Continue reading

How to Make Bootable Linux Pendrive

Posted on Fri 01 January 2016 in How To DIY • Tagged with Linux, USB

Well, you may not realize today, but it is very essential to have a Bootable Linux Pen Drive with you. Many times, your system may crash unexpectedly, or even your DVD ROM faces some problem or you might just want to dual boot Linux with Windows to give it a …


Continue reading

Understanding Complete Boot Process In Linux

Posted on Thu 11 September 2014 in Linux • Tagged with Boot, Linux

Ever wondered, what happens behind the scenes to boot Linux? Knowing about what happens from the time you press the power button to the time when you get the login screen on Linux, i.e. boot process in Linux is very important. It can come very handy when you're debugging …


Continue reading

How To Save Logs In IRC using XChat

Posted on Sun 24 August 2014 in How To DIY • Tagged with FOSS, IRC, Logging, xChat

Howdy Readers! Wonder if you're facing any problem regarding any FOSS project, the first thing you'll do is Google it to solve your problem. But sometime it can happen, you couldn't find it on the net, may be you discovered a bug? or let's say you just want to contribute …


Continue reading

Structures And User Defined Data Types (Part - I)

Posted on Tue 05 August 2014 in C • Tagged with C Programming, structures, User Defined Data Types

Howdy folks, hope you're doing well. We've already discussed about 1D Arrays and their memory organization and further about 2D arrays and multidimensional arrays. In case you missed it, read them first. Coming to this tutorial, we'll be discussing the way to develop our own data types in the C …


Continue reading