Learn how to test your website speed using Python in this dead simple tutorial. Download this ready to go Python script to test your website speed | Continue reading
Learn the Golang programming language as a Python developer in this tutorial that gets you started in the right direction. | Continue reading
What is ADD? ADD stands for “Autonomous Distributed Database”, and proves the theory of a distributed database that is truly autonomous, requires no custom configuration or human intervention. How does it work? Just run it on a networked node and leave it to operate at full fault … | Continue reading
Given a directory that contains: We can create a runme.sh file to always make sure we are running python 3. Create a shell script Create a file called runme.sh and put the following code in: Now instead of running python app.py or python3 app.py, you can simply run sh runme.sh. W … | Continue reading
Learn how to get started using Docker and creating your own custom images in this Introduction to Docker | Continue reading
In this tutorial, we will create a Python application that can be installed directly from pip that will show the 10 latest blog posts from this website (the one you are reading this on!). If you just want to avoid all of this hard work and publish a python script directly, you ca … | Continue reading
Automatically Publish your Python applications to the Python Package Index (PyPI) for use through Pip. If you have ever needed to publish your python scripts to Pypi, you will know of all the work required to do so. Makepip takes all the effort away by providing a command-line to … | Continue reading
In this tutorial, we will create a Python application that can be installed directly from pip that will show the 10 latest blog posts from this website (the one you are reading this on!). If you just want to avoid all of this hard work and publish a python script directly, you ca … | Continue reading
This occasionally comes up during coding interviews and is actually quite a decent way to test someone’s aptitude of moving back and forth on a string to determine if and where palindromes exist. If we simply said: “return a boolean if a string is a palindrome”, then threw a coup … | Continue reading
Learn how to write Anonymous Functions in Javascript, understand scoping of variables and wrapped functions and write back to the window object. | Continue reading
I often need to test a specific Linux binary or make sure something works as expected from yum install or apt install. To do this, it’s common to have a virtual machine lying around, or even a VPS that you can just quickly log into. Things are a bit easier and quicker if you use… … | Continue reading
Let’s say that you have a binary tree and we needed to know it’s maximum depth. Binary tree input data [3,9,20,null,null,15,7] could be visualised as follows: In the above example, the depth would be 3. As there are 3 levels. How would we write some Python code to work this out? … | Continue reading
Learn how to crack the Fizz Buzz programming interview question in a matter of seconds with this incredible tutorial today! | Continue reading
Learn how to Deploy a Helm "Hello World" application onto Kubernetes and AWS EKS in under 5 minutes with this simple tutorial. | Continue reading
Learn how to write a Quicksort Algorithm in Python so that you can ace programming interviews at all the best tech companies! | Continue reading
Platform Engineering is something that grew out of a mix of what software developers and sysadmins had been doing for years. The only real difference is that most software these days either lives somewhere in some cloud or various services that support it do. Meaning that someone … | Continue reading
Learn how to beat the programming interview question on how to Reverse a Binary Tree in Python with this simple tutorial. | Continue reading
(Last Updated On: February 18, 2020)At Statvoo we found ourselves in the position where we needed to move our master MySQL database without ANY downtime and for anyone who’s tried to do this, you will know how hard this can be if it is not done exactly right. Below I will run thr … | Continue reading
Learn how to safely parse JSON using Javascript. Sanitize your application function input variables before using them in this tutorial. | Continue reading
Learn how to push Docker Images to AWS Elastic Container Registry (ECR) instead of pushing them to Docker Hub in this in depth tutorial. | Continue reading
Learn how to monitor bandwidth on Linux using this easily available and reliable application that you can get for free right now | Continue reading
Learn how to Package a Python app in this in-depth tutorial on using Nuitka. Build standalone Python applications fast! | Continue reading
(Last Updated On: February 4, 2020)Python is a very powerful language, there are so many libraries available for it. However, many developers will complain about its speed by comparison to certain other languages, for example, C or C++. This is because Python is an interpreted la … | Continue reading
(Last Updated On: January 30, 2020)I could honestly not tell you how many hosting providers I’ve tried over the past 15 years. Probably more than 30, 40… Easily! Today I would like to introduce you to the Hetzner Cloud. No, I do not work for Hetzner, or have any affiliation to th … | Continue reading
(Last Updated On: January 30, 2020)I could honestly not tell you how many hosting providers I’ve tried over the past 15 years. Probably more than 30, 40… Easily! Today I would like to introduce you to the Hetzner Cloud. No, I do not work for Hetzner, or have any affiliation to th … | Continue reading
Netflix is a video streaming service that has a wealth of information about their user base likes, dislikes, general consumer habits, retention lengths and much more. Netflix uses their big data to commission original programming Read more… | Continue reading
Dark Data is the biggest piece of the pie (Datumize , n.d.) when it comes to Big Data and what lies beneath huge datasets of collected information. IBM has stated in a report that over Read more… | Continue reading
The story Steve has a website which sells carpets in London. Steve’s carpet business has been doing really well and Peter has recently noticed just how well. Peter decides to get into the same business Read more… | Continue reading
In Cyber Forensic there are a vast array of tools that are used throughout most investigations, however, not all jurisdictions allow or even agree to the usage of some of them. This is mainly due Read more… | Continue reading
Cyber-attacks do not always originate from outside of the target organisation. Veritably around twenty-five percent of all data breaches occur from the inside, from employees or trusted individuals within the organisation (TechBeacon, 2018). Employees that Read more… | Continue reading
So you want to learn to program in Python and you don’t have a lot of time? That’s okay! Once you grasp some of the key concepts and ways of thinking, it will all come Read more… | Continue reading
The story Steve has a website which sells carpets in London. Steve’s carpet business has been doing really well and Peter has recently noticed just how well. Peter decides to get into the same business Read more… | Continue reading
One of the hardest things you can do after trying to get a startup or product off the ground is to simply give up and call it a day. After all, you’ve put an awful Read more… | Continue reading
Cyber forensics is hard, but it is even harder when servers are hosted in different geographical locations and an investigation needs all localities to cooperate and hand over every part of the data consistently. This Read more… | Continue reading
One of the hardest things you can do after trying to get a startup off the ground is to simply give up and call it a day. After all, you’ve put an awful lot of Read more… | Continue reading
I am a professional software engineer and do an absolute ton of devops work as well. I’ve actually never been hired into devops roles as I always go in as a programmer, but I also always end … | Continue reading
So before we begin, let me just tell you that this is a pretty useless thing to do.. But I was playing around with it while waiting for a C++ project to finish compiling, so why not! The code (clic… | Continue reading
Operating systems (OS) really have come a long way since the very first one was created by General Motors in 1956 (WIHT, 2017) to run on an IBM mainframe. Since then, there have been countless atte… | Continue reading
In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling. They can be considered as: Graphical User Interfaces (GUI’s) Interactive Text-based Conso… | Continue reading
Investigations are not proven in a jurisdiction until a detailed forensic report is created and presented to a judge or jury who can take it to the next level. Presenting digital evidence should be… | Continue reading
MySQL’s ORDER BY RAND() function can be so useful for returning random items from a table, infact, we have used it a million times over the years. The problem comes when your database tables start … | Continue reading