Technology Blog — Tutorials, Insights & Best Practices

Articles on programming and security, can't be secure without secure programming

What We Cover

Programming fundamentals, secure coding, and security topics. You can't be secure without secure programming.

Secure Coding

Secure coding in C and Python, core security patterns, and defensive programming practices.

Data Structures & Algorithms

Foundations in data structures, algorithms, and performance optimization.

Cryptography

Cryptography implementation, attacks, and secure use in applications.

Networking & Protocols

Networking fundamentals, security protocols, and protocol-level security topics.

Low-Level & Systems

Memory management, concurrency, low-level concepts, and exploit-related fundamentals.

Web & App Security

Web application security, endpoint and cloud security automation, and defensive practices.

Programming and security, together.

Articles on secure coding, cryptography, networking, low-level topics, and defensive practices. You can't be secure without secure programming.

Secure coding (C, Python)

Data structures & algorithms

Cryptography & protocols

Low-level & systems

Web & app security

Defensive practices

about-image
about image

Programming first

Strong foundations in data structures, algorithms, networking, concurrency, and memory. Code you can trust.

Security in depth

From secure coding patterns and cryptography to protocols, low-level concepts, and defensive automation.

Practical and clear

Tutorials and examples aimed at developers who want to build secure, reliable systems.

Latest Articles

Tutorials and insights on web development, DevOps, and open-source.

Contact me

Send a message below and I'll get back to you.