Why Artificial Intelligence (AI) won’t necessarily take your job
Artificial Intelligence, or simply AI these days, is when computers are able to perform tasks that humans would otherwise do.
While this is incredibly …
Read Article →In-depth guides, insights, and best practices for modern software engineering
Artificial Intelligence, or simply AI these days, is when computers are able to perform tasks that humans would otherwise do.
While this is incredibly …
Read Article →Many of us take a look at git fetch and git pull and believe them to do the exact same thing! This is just not true.
So what exactly …
Read Article →There are numerous ways to make money when you create a website or blog. It’s really cheap and easy to do these days …
Read Article →Cyber-attacks do not always originate from outside of the target organisation. Veritably around twenty-five percent of all data breaches occur from …
Read Article →Squid is a proxy software that allows a computer without internet access to proxy through another computer that does have internet access.
Squid is …
Read Article →Gems are little packaged Ruby applications that allow you to extend the ecosystem and reuse countless online sources.
If you don’t have Root on …
Read Article →Steve has a website which sells carpets in London.
Steve’s carpet business has been doing really well and Peter has recently noticed …
Read Article →Cyber forensics is hard, but it is even harder when servers are hosted in different geographical locations and an investigation needs all localities …
Read Article →One of the hardest things you can do after trying to get a startup or product off the ground is to simply give up and call it a day.
After all, …
Read Article →I am a professional software engineer and do an absolute ton of devops work as well.
I’ve actually never been hired into devops roles as I …
Read Article →So before we begin, let me just tell you that this is a pretty useless thing to do.. But I was playing around with it while waiting for a C++ project …
Read Article →Sometimes you just need to know where that image shown on your desktop is stored!
For this, there is a simple but effective line of text you can pop …
Read Article →In Cyber Forensic there are a vast array of tools that are used throughout most investigations, however, not all jurisdictions allow or even agree to …
Read Article →Operating systems (OS) really have come a long way since the very first one was created by General Motors in 1956 (WIHT, 2017) to run on an IBM …
Read Article →In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling. They can be considered as:
Investigations are not proven in a jurisdiction until a detailed forensic report is created and presented to a judge or jury who can take it to the …
Read Article →Ever since it has been possible for humans to operate computers, some have used it to perform criminal activities.
Part of a cybercriminal’s …
Read Article →This happens when your machine does not have the correct certificate bundle to access the Pypi repository, or you are behind a corporate proxy that …
Read Article →Sometimes you need to pull a remote branch and want to accept all their commits (and history) and override your own repository.
It’s quite …
Read Article →Introduction to Software Development Processes
Gabry defines the Software Development Methodology to be a set of related activities that lead to the …
Read Article →Software reuse is the process of creating software from antecedent and extant components.
There are a range of …
Read Article →Sometimes you need to see what an application is doing under the hood — what files it’s opening, what system calls it’s making, or what …
Read Article →Waterfall and Agile are by far the most commonly used software development processes, however, within them, there are many different styles of …
Read Article →Big Data shares what is commonly termed the V properties or characteristics such as Velocity, Volume and Variety which are amongst the most typical or …
Read Article →