I code I crack I pwn I hack

Development, Code, Security and thoughts

I fell for a phish

I have not, to my knowledge, fallen for any phishing attempts and have been very critical of anything I receive whether its on email, text, slack, WhatsApp etc. If I am asked to provide anything I generally question it. Well, that streak is now over...

Flutter: GetX Routes Middleware - Null check operator used on a null value

You decide to upgrading your Flutter app from version 1.x to 2.x. You upgrade Flutter, your app and all its packages, and you are now ready to run the app.You fire up the app in an emulator or on your device and you met with the following error: Null check operator used on a null value..

Code styles, and why they matter

Code linting and code styles are not uncommon, they are used in the majority of NPM packages and open source projects from my own personal experience, yet I still see a lot of developers, juniors and mid-weights, who never used linting or..

The Basics: Cross-Site Scripting (XSS)

What is a Cross-site Scripting (XSS) and how does it work? The aim of this guide is to teach you the basics of XSS so you can hopefully better protect your own applications and sites...

Flutter: Re-using named routes after they get disposed/pop'ed

I hit a problem when I was trying to re-use named routes once I had already disposed or .pop()'ed them. Since it couldn't really find a satisfactory answer during my searches, I decided to post my answer here, and hopefully it can help someone else...

Single PC Streaming - With No/Minimal Performance Loss

Dual-pc streaming is the meta, but it comes with issues such as the price. But what if I told you there is another way, you could get close to that 2 pc setup QOL without it requiring you to build another computer and for just a fraction of the price?..

The Basics: Domains, DNS and Name Servers

So, how does the browser know which website to load when you type in the address? Lets explore the world of domains, DNS and name servers, and hopefully by the end of it you will have a better understanding of how domains work and what the role of the DNS and name servers are...

Developers, its 2019, hash passwords accordingly

Photo by Tim Evans on Unsplash As a backend developer you will more than likely have to handle user logins and sign up at some point in time, if you haven't already, which means you will need to store the users' passwords...

The Basics: SQL Injections

What is a SQL injection and how does it work? The aim of this guide is to teach you the basics of SQL injections, how they work and how you can protect your applications...

We have created a political backdoor

Traditionally, backdoors are something you would only hear about when if you where talking about either buildings, cyber security, or basketball. But I would like show you how it also can be applied to politics...

A personal collection of resources

My personal collection of resources which I like or have been recommended to me. Hopefully you will find something useful! I am not affiliated with any providers, services or websites in this post, unless otherwise explicitly stated...