I'm a web designer and web developer from North Carolina who likes to experiment with new languages, computer security, and scripting.
Subscribe to my newsletter and never miss my upcoming articles
Sometimes user permissions can become a complex mess that is hard to manage well in our code. One way to manage those permissions using an integer value is with a bitmask. A bitmask is just computer jargon for an integer that represents a different v...
In this entry of our Linux Basics series, we will go over some popular commands for compressing files and directories. We will also talk about scheduling tasks and some basics of writing scripts. By the end of this post, you should be able to start p...
In this entry of our Linux Basics series, we will begin to uncover some of the file interactions possible through the command line. We'll touch on things like creating, editing, and removing files and directories, and searching files for a specific p...
In this web security article, we are going to cover Reflected XSS. We'll cover what it is, how it works, and how to prevent it. This is for educational purposes only. This post intends to teach you, the developer, how to prevent malicious attacks on...
It's easy when you first start getting into programming to stay with what you know. It doesn't matter if you are coding using PHP, Node, C, or any other language it becomes easy to stay comfortable. At some point, we all get comfortable with where we...
This article is for the DIYer or new developer looking to get an understanding of some Linux through the command line. If you are getting into building your own websites or applications, eventually you will have to jump into the dark mysterious world...