Book: The Complete Guide to Go Programming Also by me: Thinking in Go (2-book series) — Complete Guide to Go Programming + Hexagonal Architecture in Go My project: Hermes IDE | GitHub — an IDE for developers who ship with Claude Code and other AI coding tools Me: xgabriel.com | GitHub You write a validation function. Five rules. Email format, password length, age range, country code, ter
I Sniped a Solana Token in 400ms — Here's the Full Tech Stack Sniping a newly launched token on Solana is a high-stakes game that requires precision, speed, and a deep understanding of the ecosystem. Recently, I successfully sniped a Solana token in just 400ms — and I want to share the exact tech stack and strategies I used to make it happen. This article will dive deep into Jito MEV bundles, Ju
Metasploitable2 - FTP Exploitation using vsftpd 2.3.4 Backdoor 1. Objective To identify and exploit a known vulnerability in an FTP service running on a vulnerable target machine using industry-standard reconnaissance and exploitation techniques. 2. Lab Environment Component Description Attacker Machine Kali Linux Target Machine Metasploitable2 Network Type Host-only / NAT
🗺️⁀જ✈️ The Journey of a Single Click Every great story has a journey. A hero who sets out, faces challenges, crosses through different worlds, and finally returns home with something valuable. Your click is that hero. And this is its story. 🌍 The World Your Eyes See It starts with you. You’re on an app — maybe you’re trying to log into your favorite platform after a long day. You find the login
Hi everyone! I've been working on a personal project to create a desktop virtual assistant that doesn't rely on the cloud. I wanted something that felt like JARVIS but kept my data 100% private. Brain: It uses Ollama as the backend, so you can run models like Llama 3, Mistral, or Phi-3 locally. Interface: Built with PyQt6 featuring a "holographic" glassmorphism effect (transparent and sleek).
There are two sections to this. In the first section, I discuss what squad is, why it might be useful to learn, and Coding is solved, apparently. If you're a software engineer and you've been using coding agents for a while, The work has certainly changed. For most code changes, it's easier just to ask an agent to do it and you might even worry you're going too slow if you don't. For a lot of us,
If this is useful, a ❤️ helps others find it. All tests run on an 8-year-old MacBook Air. Every Rust tutorial covers Result and ?. Few cover what to actually do when you have 5 different error types flying around a real application. Here's what I settled on after shipping multiple Tauri apps. A PDF processing command might fail due to: IO error (file not found) lopdf parse error (malformed PDF) En
This is Part 1 of a two-part series. Part 2 (coming soon): Connecting to spoke clusters from a controller using multicluster-runtime, driven by ClusterProfile. The Cluster Inventory API (multicluster.x-k8s.io) is driven by SIG-Multicluster and centered on the ClusterProfile resource. It only delivers value when something produces those ClusterProfiles. That something is a cluster manager. Today, t