coding

장애인기능경진대회 도전기 – 꿈의 시작부터 준비 과정까지

장애인기능경진대회 도전기 – 꿈의 시작부터 준비 과정까지

선배의 도전에서 시작된 꿈 중학교 시절에 만난 한 선배의 도전이 내 미래의 방향을 바꿔놓았다. '컴퓨터 수리' 종목에 참가하며 열심히 준비하는 선배의 모습은 내게 큰 영감이 되었다. 지방대회에서 1위를 차지했지만 전국 대회에서 이론 문제로 고배를 마신 선배. 그런데도 그 도전 자체가 내게는 큰 동경이 되었다. '나도 언젠가는 저렇게 도전해보고 싶다'는 생각이 자연스럽게 들었고, 특히 '컴퓨터프로그래밍' 종목에 도전하고 싶다는 구체적인 목표가 생겼다. 본격적인 준비와 도전 고등학교에서는 구체적인 준비 방법을 몰라 학교 수업에만 충실했지만, 대학교에 와서 본격적으로 프로그래밍의 세계에 뛰어들었다. WinForms를 처음 배우면서 새로운 도전이 시작되었다. 교재로 기본적인 내용을 학습했지만, 실제 응용에서는 여러 난관에 부딪혔다. 특히 데이터베이스 연동 부분이 큰 과제였다. MS Access를…
Read More
Python Decorators: More Understanding into Functionality Enhancement

Python Decorators: More Understanding into Functionality Enhancement

Let’s go beyond the basics to understand decorators in depth. Decorators are not just about "extra layers" but offer a sophisticated way to add functionality to functions dynamically, making them highly adaptable and powerful. 1. What is a Decorator? In essence, a decorator is a higher-order function—a function that accepts another function as an argument, adds functionality, and returns a new function. This allows us to "decorate" an original function with added capabilities, leaving the original function unaltered. Syntax Recap: @decorator_name def my_function(): pass Enter fullscreen mode Exit fullscreen mode Using @decorator_name before my_function is shorthand for: my_function = decorator_name(my_function)…
Read More
Enabling Application Downloads in Local bolt.new

Enabling Application Downloads in Local bolt.new

In this article, I will modify bolt.new to allow applications created in the tool to be downloaded locally. This feature will facilitate internal deployment of bolt.new applications, making it particularly useful for corporate environments. Objective Add functionality to download the project files as a ZIP archive. Steps to Implement Integrate a download button in the interface Add a download button in the sidebar or toolbar. Generate a ZIP archive of the project Use a library like JSZip to bundle project files into a ZIP archive. Download the ZIP archive Trigger the browser's download functionality with the generated ZIP file. Test…
Read More
Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

Author: Trix Cyrus Waymap Pentesting tool: Click HereTrixSec Github: Click HereTrixSec Telegram: Click Here Wireless networks are the backbone of modern connectivity, offering convenience but also exposing vulnerabilities. With WPA3 emerging as the successor to WPA2, it promises enhanced security features. However, no system is entirely impervious to attacks. This article explores advanced Wi-Fi hacking techniques and the security mechanisms of WPA3 while emphasizing the importance of ethical hacking to strengthen wireless security. Understanding Wi-Fi Security Protocols Wi-Fi networks have evolved to combat increasing threats. Here’s a quick breakdown of the major security protocols: WEP (Wired Equivalent Privacy): The earliest…
Read More
Introduction to Big Data Analysis

Introduction to Big Data Analysis

Data refers to raw, unprocessed facts, statistics, or information collected for reference, analysis, and processing. They are of different formats: Structured Data: Organized in a defined format, such as rows and columns in a database Unstructured Data: No predefined structure, such as text, emails, images, videos, and social media posts. (Note: If 20 percent of the data available to enterprises is structured data, the other 80 percent is unstructured.) Semi-Structured Data: A hybrid of structured and unstructured data, like JSON or XML documents that have tags or markers to organize the data but don’t fit into a traditional database schema.…
Read More
Patching the Cracks

Patching the Cracks

Over time, I have found that building an app is like constructing a house. You need to ensure a strong foundation and infrastructure, but you also want to decorate and furnish it to make it feel alive. As developers, we’re often caught in this balancing act: pushing out features quickly versus ensuring the app is stable and reliable through testing. It’s easy to get caught up in the excitement of adding new functionality or planning the next feature, but neglecting tests can lead to a crumbling foundation that will eventually cost more time and money to repair. The red-green-refactor paradigm…
Read More
msnscript2: A Language for Developers Who Dare to Think Differently

msnscript2: A Language for Developers Who Dare to Think Differently

The Genesis of MSN2 What started as a small experiment years ago has now evolved into one of my most ambitious projects: MSN2. Unlike traditional programming languages, MSN2 breaks conventions and embraces deoptimized interpretation methods that, while quirky, reveal new possibilities for how we think about coding. Why didn’t I discard it like the other drafts before it? The answer lies in its potential—not just as a functional tool, but as an evolving passion project. It’s far from perfect, but its imperfections are what make it so intriguing. MSN2 has pushed me as a developer, challenging both my skills and…
Read More
AWK Cheat Sheet

AWK Cheat Sheet

What is AWK? awk is a powerful text-processing tool in Linux used to manipulate and analyze text files by processing patterns and performing actions. Basic Syntax awk 'pattern {action}' file pattern: The condition to match (optional). action: Commands to execute on matching lines (optional). file: The file to process. Common Examples 1. Print All Lines awk '{print}' file.txt Outputs all lines in file.txt. 2. Print Specific Columns awk '{print $1, $3}' file.txt Prints the 1st and 3rd columns. 3. Match a Pattern awk '/error/ {print}' log.txt Prints lines containing the word error. 4. Conditional Filtering awk '$3 > 100 {print…
Read More
VPC NETWORKING FUNDAMENTAL

VPC NETWORKING FUNDAMENTAL

Introduction In the pre-cloud computing era, establishing a network infrastructure required a plethora of hardware components, including Switches, Routers, Internet cables and RJ-45 connectors. These physical components enabled computers to communicate with each other and access the internet. Fast-forward to the cloud computing era, where virtualization has revolutionized networking. With Virtual Private Cloud (VPC), you can create a secure, isolated network environment without the need for physical hardware. In this guide, I will walk you through the step-by-step process of creating a Virtual Private Cloud(VPC), including setting up Public and private subnets, Internet Gateway, Network ACLs (Access Control Lists) and…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.