coderj001.hashnode.devImplementing SHA-512 in C: A Step-by-Step Guide for Programmers and DevelopersWelcome to this comprehensive, step-by-step guide on implementing the SHA-512 cryptographic hash function in C. Authored by Trish (@_trish_xD) and shared via an X thread on October 8, 2025, this tutorial is designed for programmers and developers who...Oct 10, 2025·8 min read
coderj001.hashnode.devUnderstanding Strings, Runes, and Bytes in GoIn the Go programming language, character representation diverges from the conventional character data types found in other programming languages. Instead, Go utilizes runes and bytes to handle character values. This article provides a comprehensive ...Jun 15, 2024·3 min read
coderj001.hashnode.devComprehensive Guide to Linux Namespace TypesLinux namespaces are a fundamental feature of the Linux kernel, enabling the creation of isolated environments for processes. This isolation allows for robust and secure environments, laying the groundwork for containerization technologies like Docke...Jun 9, 2024·3 min read
coderj001.hashnode.devComprehensive Guide to Implementing Enums in GolangEnums, or enumerators, are a powerful data type used to represent a set of named constant values. While Golang does not support enums directly, it is possible to implement them using constants and the iota identifier. This guide delves into the imple...May 28, 2024·4 min read
coderj001.hashnode.devGoLang: A Brief OverviewIn 2007, Google faced a daunting challenge: maintaining programs with millions of lines of code. Before testing, they needed to compile code into a runnable form, a process that took hours. To tackle this, Google Engineers Robert Griesemer, Rob Pike,...May 27, 2024·3 min read