rssed

a collection of dev rss feeds - blogroll

Add a new feed

+

161 feeds


Akash Rajpurohit

Posts

PairDrop β€” Transfer files between devices seamlessly πŸ”—

PairDrop is a self-hosted file transfer service that allows you to transfer files between devices seamlessly. It is a great alternative to services li [...]

Mount a drive permanently with fstab in Linux πŸ”—

Let's see how to mount a drive permanently in Linux using the fstab file which will mount the drive automatically on boot. [...]

Learning Through Building β€” Engineering Advices πŸ”—

Over the years, I have learned a lot of things through building projects. In this post, I will be sharing some of the advices that I have learned thro [...]

Setup Jellyfin with Hardware Acceleration on Orange Pi 5 (Rockchip RK3558) πŸ”—

Recently I moved my Jellyfin to an Orange Pi 5 Plus server. The Orange Pi 5 has a Rockchip RK3558 SoC with integrated ARM Mali-G610. This guide will s [...]

Jellyfin + arr stack β€” Self-hosted media streaming in my Homelab πŸ”—

Since ages, I have been collecting lots of movies, TV shows, and music. Ever since I got into self hosting, I have been looking for a way to stream my [...]

Syncing made easy with Syncthing πŸ”—

Syncthing is one of those tools which have made my life easier. It is a decentralized file synchronization tool which is open source and free to use. [...]

Optimizing cAdvisor for Lower CPU Usage πŸ”—

So you are seeing high CPU usage from cAdvisor, well I was too. Here is how I fixed it. [...]

Welcoming a new member to my Homelab β€” A Orange Pi 5 Plus πŸ”—

Happy to share that I have added a new member to my homelab, a Orange Pi 5 Plus. In this post, I will share the specs and the initial setup process. [...]

Tailscale β€” Accessing Homelab services outside my network πŸ”—

Tailscale is another service that I use in my homelab setup to access my services outside my network. It's a VPN service that makes it easy to access [...]

How I use GPG in my day to day workflows πŸ”—

GPG is a powerful tool that allows you to encrypt and sign your data and communications. In this post, I will explain how I use GPG in my day to day w [...]

What is GPG and why you should start using it πŸ”—

GPG is a tool that allows you to encrypt and sign your data and communications. In this post, I will explain what GPG is and why you should start usin [...]

Ansible β€” Configuration as Code for building up my Homelab πŸ”—

I have been using Ansible to manage my homelab infrastructure. It's a great tool to automate the deployment and configuration of servers and services. [...]

AdGuard Home β€” Network Wide Ad Blocking in your Homelab πŸ”—

Let's talk about AdGuardHome, a network-wide ad blocking software that you can run in your homelab. It's a great way to block ads and trackers on your [...]

Nginx β€” The reverse proxy in my Homelab πŸ”—

Nginx is a powerful reverse proxy that I use in my homelab to expose services to the internet. In this post, I'll show you how I use it and how you ca [...]

Resolving Missing Memory Stats in Docker Stats on Raspberry Pi πŸ”—

Running Docker containers on your Raspberry Pi can be a great way to explore different software and services. However, encountering issues with retrie [...]

Building a Read-Heavy System: Key Considerations for Success πŸ”—

In this article, we will discuss the key considerations for building a read-heavy system and how to ensure its success. [...]

Building a Write-Heavy System: Key Considerations for Success πŸ”—

In this article, we'll discuss crucial considerations that can guide you towards success in building a write-heavy system and help you navigate the co [...]

Tackling Thundering Herd Problem effectively πŸ”—

In this article, we will discuss what is the thundering herd problem and how you can tackle it effectively when designing a system. [...]

How the Bulkhead Pattern Can Fortify Your System πŸ”—

In this article we will explore the Bulkhead pattern, a pattern that can help you build more resilient systems. [...]

Exploring OverTheWire: Level 20 to Level 21 - Bandit Challenge πŸ”—

Welcome back to our captivating journey through the Bandit Challenge! In this blog post, we're geared up to conquer Level 21, where a setuid binary in [...]

Exploring OverTheWire: Level 19 to Level 20 - Bandit Challenge πŸ”—

Welcome back to our thrilling journey through the Bandit Challenge! In this blog post, we're poised to conquer Level 20, where we encounter a setuid b [...]

Exploring OverTheWire: Level 18 to Level 19 - Bandit Challenge πŸ”—

Welcome back to our riveting journey through the Bandit Challenge! In this blog post, we're set to conquer Level 19, where a password is concealed wit [...]

Exploring OverTheWire: Level 17 to Level 18 - Bandit Challenge πŸ”—

Welcome back to our captivating journey through the Bandit Challenge! In this blog post, we're set to conquer Level 18, where our mission is to identi [...]

Exploring OverTheWire: Level 16 to Level 17 - Bandit Challenge πŸ”—

Welcome back to our exhilarating journey through the Bandit Challenge! In this blog post, we're poised to conquer Level 17, where we're tasked with su [...]

Exploring OverTheWire: Level 15 to Level 16 - Bandit Challenge πŸ”—

Welcome back to our captivating journey through the Bandit Challenge! In this blog post, we're poised to conquer Level 16, where the path to victory l [...]

Exploring OverTheWire: Level 14 to Level 15 - Bandit Challenge πŸ”—

Welcome back to our enthralling voyage through the Bandit Challenge! In this blog post, we're set to conquer Level 15, where the key to success lies i [...]

Exploring OverTheWire: Level 13 to Level 14 - Bandit Challenge πŸ”—

Welcome back to our adventurous journey through the Bandit Challenge! In this blog post, we'll conquer Level 14, where we'll obtain a private SSH key [...]

Exploring OverTheWire: Level 12 to Level 13 - Bandit Challenge πŸ”—

Welcome back to our exhilarating journey through the Bandit Challenge! In this blog post, we'll conquer Level 13, where we'll encounter a password sto [...]

Exploring OverTheWire: Level 11 to Level 12 - Bandit Challenge πŸ”—

Welcome back to our thrilling adventure through the Bandit Challenge! In this blog post, we'll conquer Level 12, where we'll encounter a password stor [...]

Exploring OverTheWire: Level 10 to Level 11 - Bandit Challenge πŸ”—

Welcome back to our exciting journey through the Bandit Challenge! In this blog post, we'll tackle Level 11, where we'll encounter a password stored i [...]

Self-Host Vaultwarden with Scheduled Backups πŸ”—

In this article, I will show you how to self-host Vaultwarden along with a backup solution that will periodically backup your data safely. [...]

HTTPS with self-signed certificates for your Homelab services πŸ”—

In this article we will deep dive into understanding how we can setup HTTPS with self-signed certificates for our Homelab services.This is often requi [...]

Setup Shareable Drive with Samba in Linux πŸ”—

In this article we will setup a shareable drive in Linux with SMB. We will learn how to setup the share directory using Samba on server and how to mou [...]

Setup Shareable Drive with NFS in Linux πŸ”—

In this article we will learn how to setup a shareable drive with NFS in Linux. We will see the steps to setup NFS server and mount the drive on a cli [...]

Linkding: Self Hosted Bookmark Manager πŸ”—

In this post I will show you how to setup Linkding, a self hosted bookmark manager that I am personally using for a while now and I am very happy with [...]

Safely Backup PostgreSQL Database in Docker / Podman Containers πŸ”—

In this article, we will learn how to safely backup PostgreSQL database in Docker/Podman containers safely. We will also learn how to restore the data [...]

Fix Sudo not asking Password on Raspberry Pi πŸ”—

If you have installed a fresh copy of Debian or Raspbian on your Raspberry Pi you might notice that sudo does not ask for a password. This is a securi [...]

Increase Swap Memory on Raspberry Pi πŸ”—

There can be multiple scenarios where you need to increase the swap memory size on your Raspberry Pi. This post will show you how to do it. [...]

Update Wifi Password on Raspberry Pi in Headless Mode πŸ”—

Changing the wifi password after the first installation can be tricky sometimes. Here is a quick guide on how to do it quickly and easily. [...]

2023 Unwrapped πŸ”—

Looking back a year and talking about how 2023 was for me [...]

My self hosting journey in 2023 πŸ”—

In the journey of homelabbing, I have started self hosting some really amazing services that I am using in my day to day life. This blog outlines what [...]

Exploring OverTheWire: Level 9 to Level 10 - Bandit Challenge πŸ”—

Welcome back to our thrilling journey through the Bandit Challenge! In this blog post, we'll conquer Level 10, where we'll search for a password hidde [...]

Exploring OverTheWire: Level 8 to Level 9 - Bandit Challenge πŸ”—

Welcome back to our exciting journey through the Bandit Challenge! In this blog post, we'll conquer Level 9, where we'll search for a password hidden [...]

Exploring OverTheWire: Level 7 to Level 8 - Bandit Challenge πŸ”—

Welcome back to our thrilling journey through the Bandit Challenge! In this blog post, we'll conquer Level 8 by searching for a password hidden within [...]

Exploring OverTheWire: Level 6 to Level 7 - Bandit Challenge πŸ”—

Welcome back to our thrilling journey through the Bandit Challenge! In this blog post, we'll tackle Level 7, where we're tasked with finding a passwor [...]

Exploring OverTheWire: Level 5 to Level 6 - Bandit Challenge πŸ”—

Welcome back to our thrilling journey through the Bandit Challenge! In this blog post, we'll conquer Level 6 by hunting for a password hidden within a [...]

Exploring OverTheWire: Level 4 to Level 5 - Bandit Challenge πŸ”—

Welcome back to our thrilling expedition through the Bandit Challenge! In this blog post, we'll conquer Level 5 by uncovering the password hidden with [...]

Exploring OverTheWire: Level 3 to Level 4 - Bandit Challenge πŸ”—

Welcome back to our exciting expedition through the Bandit Challenge! In this blog post, we'll conquer Level 4 by unearthing the password hidden withi [...]

Exploring OverTheWire: Level 2 to Level 3 - Bandit Challenge πŸ”—

Welcome back to our thrilling adventure through the Bandit Challenge! In this blog post, we'll conquer Level 3 by unraveling the password hidden withi [...]

Exploring OverTheWire: Level 1 to Level 2 - Bandit Challenge πŸ”—

Welcome back to our thrilling journey through the Bandit Challenge! In this blog post, we'll conquer Level 2 by unraveling the password hidden within [...]

Exploring OverTheWire: Level 0 to Level 1 - Bandit Challenge πŸ”—

Welcome back to our journey through the Bandit Challenge! In this blog post, we will conquer Level 1 by uncovering the password hidden within a file c [...]

Exploring OverTheWire: Level 0 - Bandit Challenge πŸ”—

Join me on an exciting journey as we explore the OverTheWire challenges! In this first blog post, we will dive into Level 0 of the Bandit Challenge. D [...]

AdGuard Home + Tailscale = Erase Ads on the Go πŸ”—

Fed up with pesky online ads? In this blog, I'll show you how a dynamic duo, AdGuard Home and Tailscale, can give you ad-free browsing anytime, anywhe [...]

How I Safeguard Essential Data in My Homelab with Off-site Backup on Cloud πŸ”—

Data is the lifeblood of my homelab, and losing it would be a nightmare. Join me in exploring my backup strategy, featuring rclone and systemd, to kee [...]

Easily Backup your Local Data to the Cloud in Linux πŸ”—

In this digital age, securing your precious data is non-negotiable. Let's delve into the world of continuous backups using a nifty tool called rclone, [...]

Linux System Logs: An Overview of System Logs and How to Read Them πŸ”—

Have you ever wondered where all the information about your system's activities and events is stored? Linux system logs contain a wealth of informatio [...]

Linux RAID Configurations for Data Redundancy and Performance πŸ”—

RAID is a popular method of combining multiple physical storage devices into a single logical unit, for the purposes of improving data redundancy and/ [...]

How I setup SSH config for effectively managing multiple servers πŸ”—

Managing multiple servers can be a breeze with SSH configuration. Learn how to leverage the SSH config file to streamline your connections, enhance se [...]

Exploring the Linux File System πŸ”—

Welcome to a fascinating journey into the heart of the Linux operating system! In this blog, we'll take you on a tour of the Linux file system, unrave [...]

Choosing the Right Data Storage Solution: SQL vs. NoSQL Databases πŸ”—

Navigating the world of data storage solutions can be like choosing the perfect tool for a job. Join me as we dive into the dynamic debate of SQL and [...]

Raft and Paxos: Distributed Consensus Algorithms πŸ”—

Dive into the world of distributed systems and unravel the mysteries of consensus algorithms with Raft and Paxos. In this blog, we'll embark on a huma [...]

Understanding Load Balancing Algorithms: Round-robin and Consistent Hashing πŸ”—

Welcome to the world of load balancing algorithms, where we unravel the magic behind Round-robin and Consistent Hashing. If you have a solid grasp of [...]

Dealing with Cache Avalanche to Safeguard Your System πŸ”—

In the vast digital landscape, ensuring your web applications perform seamlessly is paramount. Yet, a phenomenon called 'Cache Avalanche' can bring yo [...]

Caching Strategies: Understand Write-Through, Write-Behind, Read-Through, and Cache Aside πŸ”—

Welcome to the world of caching strategies, where we unravel the mysteries of optimizing data access with Write-Through, Write-Behind, Read-Through, a [...]

Fair Resource Allocation: Understand Rate Limiting and Throttling πŸ”—

Dive into the world of rate limiting and throttling to ensure your applications play fair when it comes to resource allocation. Learn how these powerf [...]

Eventual Consistency and Consistency Models in Distributed Systems πŸ”—

Step into the fascinating world of distributed systems, where we unravel the mysteries of eventual consistency and various consistency models. Join me [...]

Distributed Transactions: Navigating the Complex World of Data Consistency πŸ”—

Delve into the realm of distributed transactions and unravel the secrets of maintaining data consistency across multiple systems. Join me as we explor [...]

Handling Failures in Distributed Systems: The Circuit Breaker Pattern Explained πŸ”—

Discover how the Circuit Breaker Pattern empowers developers to handle failures gracefully in distributed systems. Learn how this powerful mechanism e [...]

Should You Self-Host Password Managers On-Premises? πŸ”—

The idea of self-hosting your password manager on-premises has been a hot topic in the homelab community. But is it worth the effort and potential ris [...]

Selecting the Right Git Merging Strategy: Merge Commit, Squash and Merge, or Rebase and Merge πŸ”—

Uncover the intricacies of Git merging strategies – merge commit, squash and merge, and rebase and merge. Discover the pros and cons of each approach [...]

I built my own in-house Newsletter system πŸ”—

Discover how I transformed the need for a newsletter system, sparked by Revue's shutdown, into a fulfilling side project. Dive into the my journey of [...]

SystemD Timers vs. Cron Jobs πŸ”—

Explore the world of task scheduling in Linux as we compare the classic Cron Jobs with the modern SystemD Timers. Learn when to use each method and ho [...]

Incremental Static Regeneration: Dynamic Websites with SSR and Cache Headers πŸ”—

Step into the world of web development magic as we unravel the fascinating tale of Incremental Static Regeneration (ISR). Join me on this journey wher [...]

Running SSL on Localhost πŸ”—

In today's digital landscape, security is paramount. Secure Sockets Layer (SSL) is a crucial technology that encrypts data transmitted between a user' [...]

Reduce Docker Image Size Like a Pro πŸ”—

Dive into the realm of Docker image optimization and learn how to sculpt sleek and efficient images that won't weigh down your containers. Join me on [...]

The Dangers Lurking in Free Public WiFi πŸ”—

Picture this: you're sitting at a cozy cafΓ©, sipping on your latte, and surfing the internet on the free public WiFi. Seems harmless, right? But hold [...]

Set Up Draft Pages Effectively in Astro with Config-Driven Content Authoring πŸ”—

Learn how to harness the power of content collections in Astro to manage draft pages effortlessly. Discover how to exclude draft content from producti [...]

Write Secure JavaScript Applications πŸ”—

Dive into the realm of writing secure JavaScript applications. Uncover practical strategies to shield your web apps from XSS and CSRF vulnerabilities, [...]

Multi-Threaded JavaScript with Web Workers πŸ”—

Are you tired of slow and unresponsive web applications? Do you want to improve the performance of your JavaScript code without sacrificing user exper [...]

Asynchronous JavaScript Programming: A Guide to Promises, Async/Await, and Generators πŸ”—

Asynchronous programming is essential in JavaScript to handle time-consuming operations and provide a better user experience. This article will provid [...]

Event Handling in JavaScript: Understanding Delegation and Propagation πŸ”—

Event handling is an essential part of JavaScript programming. Whether it's a simple click event or a complex user interface interaction, understandin [...]

Partial Application in JavaScript πŸ”—

In JavaScript, partial application is a powerful technique that allows you to create new functions by fixing some, but not all of the arguments of an [...]

JavaScript Design Patterns for Better Code Organization and Maintainability πŸ”—

JavaScript has become a popular programming language for building complex web applications, but with its increasing complexity, maintaining and organi [...]

Boosting Your Website's Performance with JavaScript Code Optimization πŸ”—

JavaScript is a crucial component of modern web development, and its performance can have a significant impact on user experience. By optimizing your [...]

Seamless Error Tracking: Integrating Sentry with Astro πŸ”—

Learn how to enhance your Astro-powered website's reliability by seamlessly integrating Sentry for error tracking. Discover step-by-step instructions [...]

Finding Your Way: Understanding Service Discovery and Service Mesh πŸ”—

Join me on this tech-savvy adventure as we delve into the fascinating world of service discovery and service mesh. In this blog, we'll navigate throug [...]

Building Resilient Systems: A Guide to Designing for Fault Tolerance πŸ”—

Join me on a journey into the world of building robust and resilient systems. In this blog, we'll explore the art of designing for fault tolerance, wh [...]

Designing for Scalability: Building a Flexible and Future-Proof System πŸ”—

Join me on an exciting journey into the world of scalable system design. In this blog, we'll explore the art of crafting flexible and future-proof arc [...]

High Availability Architectures: Uninterrupted Services for a Seamless Experience πŸ”—

Discover the world of high availability architectures and how they ensure your services are always up and running, no matter the circumstances. Join m [...]

Distributed Tracing and Observability in Your System πŸ”—

Dive into the world of distributed tracing and observability to gain valuable insights into your system's performance and behavior. In this blog, we'l [...]

Observability and Monitoring: Illuminating the Inner Workings of Large Systems πŸ”—

Join me on an illuminating journey into the world of observability and monitoring when building large systems. In this blog, we'll demystify the art o [...]

Consistent Hashing in Distributed Systems: Navigating Data Distribution with Finesse πŸ”—

Welcome to the captivating world of consistent hashing in distributed systems! In this blog, we'll explore the elegant technique of consistent hashing [...]

Exploring the Event-Driven Architecture πŸ”—

In the world of software engineering, architectures play a significant role in determining how a system will behave and perform. One such architecture [...]

Understanding Pub-Sub Messaging πŸ”—

Pub-Sub messaging is a popular messaging pattern used in modern software development. This pattern enables effective communication between multiple so [...]

Solving the N+1 Select Query Problem in Database πŸ”—

Are you tired of seeing slow database queries in your application? One of the most common causes of this issue is the N+1 select query problem. In thi [...]

Maximizing Query Speed with Database Indexes πŸ”—

In this article, we will take a closer look at what a database index is and how it works, and we will explore why it is an essential tool for improvin [...]

Mastering Intermediate Linux Commands for Efficient Server Management πŸ”—

As a Linux server administrator, you may have already learned the basics of Linux commands. However, to manage your server more efficiently, you need [...]

Essential Linux Commands for Server Maintenance at Home πŸ”—

As a Linux system administrator, it's essential to have a good grasp of the command-line interface. In this blog, we'll explore some of the most commo [...]

Build Your Own Docker with Linux Namespaces, cgroups, and chroot: Hands-on Guide πŸ”—

Take a practical approach to containerization as we guide you through the step-by-step process of building your own Docker-like environment using Linu [...]

How to Create a Restricted Environment with the Linux chroot Command πŸ”—

The Linux operating system is known for its flexibility and robustness. One of the many powerful tools available in Linux is the chroot command, which [...]

Linux Control Groups: Fine-Tuning Resource Allocation for Optimal System Performance πŸ”—

Explore the power of Linux control groups (cgroups) and how they revolutionize resource management in your Linux environment. Uncover the secrets of c [...]

Linux Namespaces: Isolating Your System for Enhanced Security and Performance πŸ”—

Discover the power of Linux namespaces and how they enable you to create isolated environments within your system. Dive into this comprehensive guide [...]

FZF: The Ultimate Linux Productivity Tool πŸ”—

Are you tired of endlessly scrolling through terminal output or file listings? Look no further than fzf! This powerful command-line tool allows you to [...]

Mastering App Security: 7 Crucial Risks Every Developer Must Mitigate πŸ”—

In the world of software development, ensuring the security of your applications is paramount. From protecting user data to safeguarding against malic [...]

Exploding your system: The deadly Fork Bomb in Linux πŸ”—

Are you familiar with the term 'fork bomb' in Linux? If not, it is a potentially dangerous command that can severely impact system performance and sta [...]

Linux bzip2 and gzip Compression Utilities: An Overview of File Compression πŸ”—

In the world of Linux, bzip2 and gzip are two popular compression utilities that allow you to compress and decompress files. They are efficient, fast, [...]

Beyond ext4 β€” Exploring Linux File Systems Btrfs and ZFS πŸ”—

Linux is known for its flexibility and customizability, which is largely due to its file systems. While the ext4 file system is commonly used in Linux [...]

Linux Package Management: A Guide to apt, dnf, and pacman πŸ”—

Linux package management can be daunting for new users. With multiple package managers like apt, dnf, and pacman, it can be overwhelming to understand [...]

Mastering Debugging in VSCode: A Beginner's Guide πŸ”—

Debugging is an essential part of a software developer's workflow, helping to identify and resolve issues in the code. VSCode, one of the most popular [...]

Mastering Debugging: Tips and Techniques for Software Engineers πŸ”—

Debugging is an essential part of the software development process. It can be frustrating, but with the right techniques, it can also be a rewarding c [...]

Mastering Google: Advanced Tips for Software Engineers πŸ”—

As a software engineer, your ability to find and use information quickly can make all the difference. But with the vast amount of information availabl [...]

How to Google like a Pro as a Software Engineer: Beginner's Guide πŸ”—

Google is an invaluable tool for software engineers, but knowing how to search effectively is key to finding the right information quickly. In this ar [...]

Git Beyond Basics: 7 Uncommon Git Commands Every Developer Should Know πŸ”—

Git is one of the most popular version control systems used by developers worldwide. However, most developers only use a handful of Git commands in th [...]

Embracing the Future: Migrating from Next.js to Astro πŸ”—

Discover the exciting transformation of migrating a website from Next.js to Astro. Join me as we explore the motivations behind this switch, the benef [...]

Demystifying Go-URLs: Unleashing the Power of Shortened URLs πŸ”—

Explore the world of Go-URLs and discover how they are used in various contexts. From shortening long URLs to enabling deep linking and tracking, Go-U [...]

Integration Testing in JavaScript with Jest and Nock: A Beginner's Guide πŸ”—

Integration testing is an essential part of the software development process, and it ensures that all the components of your application work together [...]

Unit Testing in JavaScript: How to Ensure Code Quality and Catch Bugs Early πŸ”—

Unit testing is a critical aspect of software development that ensures code quality, improves maintainability, and catches bugs early. In this article [...]

Building and Publishing TypeScript NPM Packages: A Step-by-Step Guide πŸ”—

Learn how to create and publish your own Npm packages using TypeScript. This comprehensive guide covers everything from setting up your project with T [...]

Snowflake ID: Generating Unique IDs for Distributed Systems πŸ”—

In modern distributed systems, generating unique IDs is crucial for data consistency and scalability. Snowflake ID is a type of unique identifier that [...]

Array and Object Manipulation in JavaScript: Advanced Techniques πŸ”—

Arrays and objects are fundamental data structures in JavaScript. They are used extensively in modern web development to store and manipulate data. In [...]

Mastering Iterators and Generators in JavaScript: A Beginner's Guide πŸ”—

JavaScript's ability to handle data manipulation and iteration has been enhanced with the introduction of iterators and generators. These powerful fea [...]

Mastering the Art of Currying in JavaScript: A Beginner's Guide πŸ”—

Are you tired of dealing with multiple function arguments in your JavaScript code? Currying is here to simplify your life! Learn how to use this power [...]

Functional Programming in JavaScript: An Introduction πŸ”—

Learn the basics of functional programming in JavaScript, a paradigm that emphasizes immutability, higher-order functions, and pure functions. Discove [...]

Understanding Pure Functions in JavaScript: A Comprehensive Guide πŸ”—

Pure functions are one of the most important concepts in functional programming. In JavaScript, they play a critical role in creating maintainable and [...]

The Power of Immutability in JavaScript πŸ”—

Immutability is a concept that has been gaining a lot of attention in the world of programming, and JavaScript is no exception. Immutability refers to [...]

Demystifying Higher Order Functions in JavaScript πŸ”—

Higher Order Functions are an essential aspect of functional programming in JavaScript. They allow developers to write more concise and reusable code, [...]

Demystifying Closures and Lexical Scopes in JavaScript πŸ”—

JavaScript’s closure and lexical scope features can be confusing for many developers, especially those coming from other programming languages. Howeve [...]

How to Use the Linux Socat Command for Bidirectional Data Transfer Between Network Connections πŸ”—

The Linux socat command provides a powerful and flexible solution for bidirectional data transfer between network connections. In this article, we'll [...]

How to Use the Linux Shred Command for Secure File Deletion πŸ”—

Deleting a file from your computer's hard drive doesn't actually erase the data, leaving it open to recovery by unauthorized individuals. The Linux `s [...]

How to Use the Linux Netcat Command for Network Communication and Testing πŸ”—

The Linux 'nc' command, also known as Netcat, is a versatile networking tool that can be used for a variety of tasks such as network communication, po [...]

A Beginner's Guide to Using the Linux Mount Command for File System Management πŸ”—

The Linux mount command is a powerful tool that allows you to attach file systems to your system's file hierarchy. In other words, you can use the mou [...]

Splitting and Concatenating Files on Linux Made Easy with the split Command πŸ”—

The Linux operating system is a favorite among developers, system administrators, and power users due to its flexibility, security, and stability. One [...]

How to Use the Linux lsof Command for Listing Open Files and Processes πŸ”—

The Linux lsof command is a powerful tool that allows you to view information about open files and processes on your system. In this article, we'll ex [...]

Tracing the Network Path with the Linux Traceroute Command πŸ”—

Have you ever wondered how your network traffic reaches its destination? The Linux traceroute command is a powerful tool that allows you to analyze th [...]

Mastering Disk Imaging and Cloning with Linux's dd Command πŸ”—

The Linux dd command is a powerful tool for disk imaging and cloning, allowing users to create exact copies of disks or partitions for backup, recover [...]

Mastering Batch Processing with Linux xargs Command πŸ”—

Batch processing tasks can be time-consuming and cumbersome when performed manually. This is where the Linux xargs command comes in handy. It enables [...]

Simplify Text Processing with the Linux Awk Command πŸ”—

Are you tired of manually processing and manipulating text files on Linux? The awk command is a powerful tool that can automate these tasks and save y [...]

Mastering Text Manipulation with the Linux sed Command πŸ”—

The Linux sed command is a powerful tool for text manipulation. It allows you to search for patterns in text and replace or delete them. With sed, you [...]

Streamline Your Linux Output with the Tee Command πŸ”—

Do you find yourself constantly redirecting output to multiple files or commands on Linux? The tee command is a useful tool that allows you to send ou [...]

Mastering the Linux Tar Command: A Guide to Archive Creation and Extraction πŸ”—

Have you ever needed to compress multiple files into one convenient package for easier transfer or storage? The Linux tar command is a powerful tool t [...]

Mastering the Art of File and Directory Search with Linux's Find Command πŸ”—

Linux is known for its command-line interface and powerful tools that help users perform various tasks efficiently. One such tool is the 'find' comman [...]

Mastering Linux grep Command for Searching Text Files and Directories πŸ”—

Searching for text within large files or directories can be a tedious task, especially if you have to do it manually. Fortunately, Linux offers a powe [...]

Simplify Your File Synchronization and Backup with Linux Rsync Command πŸ”—

Keeping your files synchronized across multiple devices and creating backups can be a daunting task, especially if you have a large number of files to [...]

Mastering Process Monitoring and Management with htop Command in Linux πŸ”—

When it comes to process monitoring and management on Linux, the htop command is a powerful tool that can help you keep track of all the processes run [...]

Discover the Power of Subnets: The Ultimate Guide πŸ”—

Subnets play a crucial role in networking by dividing an IP network into smaller subnetworks. They enable efficient use of IP address space and enhanc [...]

Exploring the Differences Between HTTP/2 and HTTP/3 πŸ”—

As the internet continues to evolve, so does the protocol that powers it - HTTP. HTTP/2 and HTTP/3 are two of the latest versions of HTTP, both design [...]

Exploring HTTP/2 Server Push: An Efficient Way to Speed Up Your Web Applications πŸ”—

HTTP/2 Server Push is an innovative feature of the HTTP/2 protocol that allows web developers to proactively push resources to clients before they eve [...]

WebSocket: Real-time Communication Made Easy πŸ”—

Are you tired of relying on traditional HTTP requests for real-time communication in your web applications? Look no further than WebSocket! This power [...]

Understanding Message Queues: The Key to Building Reliable and Scalable Systems πŸ”—

Message queues have become a fundamental part of modern software systems, allowing developers to build distributed, reliable, and scalable application [...]

Understanding Back Pressure in Message Queues: A Guide for Developers πŸ”—

Are you tired of dealing with message queues that slow down or crash under heavy loads? Back pressure is a common issue that many developers face when [...]

What is a Cache and How Does it Speed Up Your Applications? πŸ”—

Caching is a powerful technique used by software engineers to speed up their applications. But what exactly is a cache, and how does it work? In this [...]

Race Conditions: Understanding and Avoiding Them πŸ”—

Race conditions can cause unpredictable and hard-to-reproduce bugs in software systems. In this article, we'll explain what race conditions are, why t [...]

Understanding Remote Procedure Call (RPC) in Distributed Computing πŸ”—

Remote Procedure Call (RPC) is a popular mechanism used in distributed computing to allow programs running on different machines to communicate with e [...]

Understanding Representational State Transfer (REST) πŸ”—

Learn what Representational State Transfer (REST) is and how it has become the de facto standard for building web APIs today. [...]

What is UDP and When to Use it? A Comprehensive Guide πŸ”—

UDP is a lesser-known protocol when compared to TCP, but it plays a vital role in network communication. If you are looking to learn about UDP and its [...]

Demystifying TCP: A Comprehensive Guide to Transmission Control Protocol πŸ”—

TCP is a fundamental protocol of the internet, and understanding how it works is essential for anyone who wants to know more about networking. In this [...]

Understanding Federation in Databases: Definition, Types and Use Cases πŸ”—

Learn about how federated databases enable the efficient management of distributed systems by allowing for seamless data access and sharing across mul [...]

Exploring Sharding in Databases: Partitioning Your Data for Better Scalability πŸ”—

Sharding is a method of breaking up a large database into smaller, more manageable pieces, allowing for greater scalability and performance. This tech [...]

Master-Slave Replication: Scaling Your Database for High Availability πŸ”—

As businesses grow, their databases can become overloaded and slow, leading to a poor user experience. To address this issue, database administrators [...]

Exploring Master-Master Replication in Databases: How It Works and Its Benefits πŸ”—

Master-master replication is a powerful technique that can help you improve the availability and scalability of your database system. But what exactly [...]

The Power of a CDN: Delivering Lightning-Fast Content πŸ”—

Do you want your website to load faster for users all over the world? A Content Delivery Network (CDN) is the solution you've been looking for. This a [...]

Balancing the Load: Understanding Load Balancers and Their Types πŸ”—

Dealing with a heavy traffic load on your website or application? Learn about load balancers and how they distribute traffic to keep your online prese [...]

Unlocking the Secrets of SSL Certificates: How They Keep Your Data Safe Online πŸ”—

Are you curious about how SSL certificates work to secure your online transactions? In this article, we'll explore the technicalities of SSL certifica [...]

VPN Explained: Understanding Virtual Private Networks πŸ”—

Learn about the basic principles and use cases of VPNs, and how they help keep your internet traffic secure and private. [...]

Unlocking the Power of Forward Proxies: Simplified πŸ”—

Discover what a forward proxy is and how it can be used to enhance network security, increase browsing speed, and more. Get a clear understanding of t [...]

Reverse Proxies: A Beginner's Guide to Unlocking Their Power πŸ”—

A reverse proxy is an intermediary server that sits between your client and servers, routing client requests to the appropriate server. In this articl [...]

Latency vs Throughput: Balancing the Two Sides of System Performance πŸ”—

When it comes to optimizing the performance of a system, two key metrics come into play: latency and throughput. But what exactly are these two metric [...]

Balancing the Tradeoff: Availability vs Consistency πŸ”—

In the world of computing, a delicate balance must be struck between two important concepts: Availability and Consistency. But what exactly do these t [...]

Performance vs Scalability: Understanding the Key Differences πŸ”—

Performance and Scalability, two crucial components of any system design, yet often misinterpreted. In this article, we will dive into the technicalit [...]

Zero Day Attacks: Understanding the Unannounced Threats πŸ”—

Discover the dangerous world of zero day attacks and learn how they can exploit vulnerabilities in software to cause harm to businesses and individual [...]

Denial of Service Attacks: What They Are and How to Protect Against Them πŸ”—

Discover the basics of Denial of Service (DoS) attacks and learn how to safeguard your website and online presence from these malicious attacks. [...]

Understanding DHCP Server - The Essential Guide πŸ”—

DHCP, or Dynamic Host Configuration Protocol, is a crucial component of modern network infrastructure. In this article, we'll explore what a DHCP serv [...]

Understanding Recursive DNS: A Comprehensive Guide πŸ”—

Learn about Recursive DNS, how it works and its benefits. Discover why Recursive DNS is important for improving the speed and reliability of domain na [...]

Unleash the Power of Self-Hosted Services with Cloudflare Tunnels πŸ”—

Say goodbye to complicated port forwarding and hello to effortless access to your self-hosted services with Cloudflare Tunnels. Discover how to config [...]

Dynamic DNS Made Easy with Cloudflare API πŸ”—

Get rid of the hassle of manual IP updates for your domain with our step-by-step guide on how to create a DDNS using Cloudflare DNS API. Effortlessly [...]

Concurrency vs. Parallelism: Understanding the Key Differences πŸ”—

Concurrency and parallelism are often used interchangeably, but they refer to distinct concepts in computer science. In this article, we will break do [...]

Navigating Your Database Efficiently: Cursor Based Pagination vs Offset Based πŸ”—

Take control of your database performance with cursor based pagination. Learn why it's a better option compared to offset based pagination. [...]

The Importance of 99th Percentile Latency in System Performance πŸ”—

Latency is a crucial metric for measuring the performance of any system, and understanding the 99th percentile is crucial for determining real-world p [...]

Installing the Latest Version of Golang on Your Raspberry Pi πŸ”—

Get started with developing in Golang on your Raspberry Pi. This comprehensive guide will show you how to install the latest version of Golang on your [...]

Get Up and Running with the Latest Version of Node.js on Raspberry Pi πŸ”—

Do you want to run the latest version of Node.js on your Raspberry Pi? This guide will take you through the process of installing the latest version o [...]

Mastering Dotfiles Management with GNU Stow πŸ”—

If you're a software developer or a power user who works with a UNIX-like operating system, you might have heard about dotfiles. Dotfiles are hidden c [...]

Effortlessly Manage Torrent Downloads with Headless qBittorrent on Linux πŸ”—

Learn how to install qBittorrent on a Linux server without a GUI and run it in the background with SystemD for a seamless torrenting experience. [...]

Revamp Your Old Android Phone into a Mini Linux Server πŸ”—

Turn your old Android phone into a portable Linux server with the Linux Deploy app. Learn how to set up a Debian server on your device and use it to h [...]

Running a Service in the Background with SystemV in Linux: A Comprehensive Guide πŸ”—

Take control of your background services with SystemV in Linux. Learn how to write a SystemV init script, install and start the service, and control i [...]

Keep Your Services Running in the Background with SystemD πŸ”—

Do you want your Linux services to keep running even after you log out of your system? SystemD makes it easy to run services in the background. In thi [...]

Init Systems Unveiled β€” Understanding the Differences between SystemD and SystemV πŸ”—

Get a comprehensive understanding of SystemD and SystemV init systems in Linux. Explore the similarities and differences between these two init system [...]

Effortlessly Download Torrents on Your Server with Aria2 πŸ”—

Don't wait hours for torrents to download on your server. Aria2 is a lightweight, open-source download manager that can handle torrents with ease. In [...]

Stay Secure β€” Essential SSH Security Practices for Linux Servers πŸ”—

Protect your Linux server from potential threats by following best practices for SSH security. Learn about using strong passwords, disabling root logi [...]

Protect Your Linux Server with UFW Firewall: A Step-by-Step Guide πŸ”—

Ensure the security of your Linux server by setting up a firewall. UFW (Uncomplicated Firewall) is a user-friendly firewall that's easy to set up and [...]

Building My First Home Lab πŸ”—

Finally after waiting for a long time, I started building my first Home lab and here's how I got started with it. [...]

How to protect your website from attacks using Cloudflare WAF and Rate Limiting πŸ”—

In this article, I will explain how I was able to protect my website from attackers and how you can too using Cloudflare WAF and rate limiting. [...]

How to setup Cloudflare proxy for your website hosted on Vercel or Netlify πŸ”—

In this article, I will show you how to properly set up Cloudflare proxy for any of your website which is hosted on some other service like Vercel or [...]

How I automatically generate a dynamic sitemap in Next.js πŸ”—

Learn how to generate a dynamic sitemap on build time automatically in Next.js with Contentlayer [...]

3 simple steps to create a local backup of Postgres database using Bash script πŸ”—

In this article, I will show you how I back up the Postgres database hosted on Supabase (ideally can be anywhere) to the local system and automate thi [...]

Add a Honeypot in your Forms to avoid Spam Submissions πŸ”—

Learn how to quickly add a spam filter to reduce spam submissions in any of your forms on your website. [...]

How to add fuzzy search to your React app using Fuse.js πŸ”—

Learn how to create a reusable useSearch hook in react using Typescript to add searching functionality in your app [...]

Open Source alternatives you must try - Part 2 πŸ”—

List of open source alternatives for Comment systems and virtual meetings [...]

Open Source alternatives you must try - Part 1 πŸ”—

List of open source alternatives for Analytics and No-code tools [...]

Journey into "how to professionally say" project πŸ”—

Join me in the journey of this project which got way more traction than expected [...]

How to use ES6 import syntax in Node.js πŸ”—

Learn how to quickly start using ES6 import syntax in Node.js [...]

Increase Root Partition Size On Fedora πŸ”—

Learn how to increase root partition size on fedora in 2 simple steps. [...]

Backup Users Home Directory In Linux Using Tar Command πŸ”—

Learn how to easily and systematically backup your home directory in linux. [...]

Disable Source Maps in GatsbyJs V2 for Production. πŸ”—

Quickly disable source maps in gatsbyjs for your production website. [...]

Infosys Power Programmer Interview Experience πŸ”—

Sharing my Infosys power programmer interview experience [...]

How to manage multiple Node.js versions on your system πŸ”—

Learn how to manage multiple versions of Node.js on your local system with ease. [...]

Top Free Services To Deploy Full-Stack Applications πŸ”—

Sharing the list of these amazing free services that can help you go online with your app for free. [...]

LNT Infotech (LTI) Interview Experience. πŸ”—

Sharing my LTI pool placement process with the interview experience. [...]

API Rate Limit for Production Ready Applications in Node.js πŸ”—

Learn how to quickly rate limit your API endpoints for small and large size applications [...]

HackWithInfy 2019 Round 2 Experience. πŸ”—

Sharing my Hackwithinfy 2019 Round 2 experience and other useful tips. [...]

HackWithInfy 2019 Round 1 Experience. πŸ”—

Sharing my Hackwithinfy 2019 Round 1 experience and other useful tips. [...]

Github CLI ready for your terminal. πŸ”—

Read more about the new beta feature added by Github which is their Command Line Interface(CLI). [...]

New Features in ES2020 with code examples. πŸ”—

Get insights about new features added in Javascript es2020 like BigInt, Promise.allSettled, Optional Chaining and many more. [...]

5 Basic Git Commands Every Developer Must Know πŸ”—

Learn the top 5 basic git commands with examples that you must know as a developer in 2020. [...]

TCS Codevita Interview Experience πŸ”—

Sharing my TCS Codevita interview experience with bonus tips and questions. [...]

Learn JavaScript Array .reduce() method with code examples πŸ”—

Learn about Javascript array reduce method also chaining it with map and filter [...]

Learn JavaScript Array .filter() method with code examples πŸ”—

Learn about Javascript array filter method in easiest way possible. [...]

Learn JavaScript Array .map() method under 5 minutes with code examples πŸ”—

Comprehensive yet very easy explanation about JavaScript array map method along with code examples [...]

Welcome to my website πŸ”—

Finally I have started with this blogging platform. Hope you will have a good time here 😍😍 [...]