itechnology.hashnode.devHow to style use Google Fonts with CSS FlexboxHow to style use Google Fonts with CSS Flexbox In this quick guide, you'll learn How to style use Google Fonts with CSS Flexbox with practical examples you can use right away. TL;DR To use Google Fonts, use the approach shown below. It's the recommen...5d ago·2 min read
itechnology.hashnode.devsecure coding practices explained simplysecure coding practices explained simply If you've been wondering secure coding practices explained simply, you're in the right place. Let's break it down step by step. TL;DR To secure coding practices, use the approach shown below. It's the recommen...5d ago·2 min read
itechnology.hashnode.devOWASP Top 10 checklist for developersOWASP Top 10 checklist for developers OWASP Top 10 checklist for developers is one of the most common tasks in cybersecurity. Here's the simplest way to do it. TL;DR To OWASP Top 10, use the approach shown below. It's the recommended way in modern cy...5d ago·2 min read
itechnology.hashnode.devHow to protect against two-factor authenticationHow to protect against two-factor authentication If you've been wondering How to protect against two-factor authentication, you're in the right place. Let's break it down step by step. TL;DR To two-factor authentication, use the approach shown below....5d ago·2 min read
itechnology.hashnode.devBurp Suite basics checklist for developersBurp Suite basics checklist for developers Struggling with Burp Suite basics? This tutorial shows you Burp Suite basics checklist for developers in under 5 minutes. TL;DR To Burp Suite basics, use the approach shown below. It's the recommended way in...5d ago·2 min read