Research

Here I’ll have some articles and other resources from where I derive information when making design and content choices. For now it’s more of a repository, but soon I’ll use this page as a home for citations linked throughout the site. Rad.

Dev.To

  • I want to build an expense tracker application which gives you a daily, weekly and monthly expenditure at the end of the specified deadline of above 3 and also gives you a comparison in terms of % that you have spent xyz% more or less than yesterday/last week/last month but I am confused about how to implement […]
  • In an age where cyber threats are a daily concern and online privacy is increasingly fragile, knowing how to protect yourself is critical. Enter the proxy server: a small but powerful tool that acts as your gateway to a safer, faster, and more private internet experience. So, what exactly is a proxy server? Let’s break […]
  • Abstract This post explores how privacy is evolving on blockchain platforms, with a focus on Arbitrum’s innovative privacy solutions. We discuss Arbitrum’s role in enhancing blockchain confidentiality by leveraging optimistic rollups, cryptographic tools like Zero-Knowledge Proofs, ring signatures, and stealth addresses. The post also delves into real-world applications from finance to NFT marketplaces, examines challenges […]
  • Building CLI Applications in Python Introduction: Command-line interface (CLI) applications offer a powerful and efficient way to interact with a computer. Python, with its rich ecosystem of libraries, is an excellent choice for developing robust CLIs. This article provides a brief overview of building such applications. Prerequisites: Before starting, ensure you have Python installed on […]
  • Handling Django migrations in a Kubernetes environment can quickly go sideways if you're not careful — causing downtime, deadlocks, or even data loss. 😬 In my latest blog post, I break down: ✅ Why running migrate in your main app container is risky ✅ How to run migrations safely using Kubernetes Jobs ✅ Real-world deployment […]

WordPress

The Hacker News

  • North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. "In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread
  • Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  "The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue," ReliaQuest said in a report published this […]
  • When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not involve human credentials at all, as we witness the exponential growth of Non-Human Identities (NHIs).  At the top of mind when NHIs are mentioned, most […]
  • Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions. The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed below – CVE-2025-27610 (CVSS score: 7.5) – A path […]
  • Cybersecurity researchers are warning about a new malware called DslogdRAT that's installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were "installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024," JPCERT/CC researcher Yuma

jQuery News

  • Last February, we released the first beta of jQuery 4.0.0. We’re now ready to release a second, and we expect a release candidate to come soon™. This release comes with a major rewrite to jQuery’s testing infrastructure, which removed all deprecated or under-supported dependencies. But the main change that warranted a second beta was a […]
  • jQuery’s influence on the web will always be evident. When it was first introduced in 2006, jQuery became a fundamental tool for web developers almost immediately. It simplified JavaScript programming, making it easier to manipulate HTML documents, handle events, perform animations, and much more. Since then, it has played and continues to play a major […]
  • jQuery 4.0.0 has been in the works for a long time, but it is now ready for a beta release! There’s a lot to cover, and the team is excited to see it released. We’ve got bug fixes, performance improvements, and some breaking changes. We removed support for IE
  • jQuery 3.7.1 has been released! This release fixes a regression from jQuery 3.6.0 that resulted in rounded dimensions for elements in Chrome and Safari. Also, a (mostly) internal Sizzle method, jQuery.find.tokenize that was on the jQuery object was accidentally removed when we removed Sizzle in jQuery 3.7.0. That method has been restored. As … Continue […]
  • jQuery 3.7.0 is now available! This release has it all: bug fixes, a new method, and a performance improvement! We even dropped our longtime selector engine: Sizzle. Or, I should say, we moved it into jQuery. jQuery no longer depends on Sizzle as a separate project, but has instead dropped its code directly into jQuery […]