0xria.hashnode.devBeyond the CSV: Building a Secure Data Pipeline....Hola and happy new year, everyone! I really wanted to upload this earlier, but it's alright, sooo, let's dive into the business of the day 😅. Did you know that most 'bugs' in your program aren't actually in your code? They're lurking in your data. I...Jan 20·2 min read
0xria.hashnode.devStrengthen Your Digital Shield: The Power of Strong Passwords Against Cyber Threats...Introduction: Over 80% of data breaches are caused by weak or reused passwords. Many people underestimate the importance of strong passwords due to perceived inconvenience and a lack of awareness about the risks associated with weak passwords. Strong...Apr 30, 2025·3 min read
0xria.hashnode.devTop 5 Free Tools Every Beginner Ethical Hacker Should TryGetting into ethical hacking can feel overwhelming at first—there’s so much to learn, and all those fancy tools can seem intimidating. But the truth is, you don’t need to spend a penny to start exploring the cyber world. When I first began my learnin...Apr 14, 2025·3 min read
0xria.hashnode.devTest Driven DevelopmentTest Driven Environment is a software development process that emphasizes writing automated tests before writing the actual code. The process involves writing a test case that defines the desired behaviour of a piece of code, and then writing the cod...Nov 13, 2023·3 min read