Notes and tutorials about programming, web development, and AI.
Aug 7, 2024
Question: I want to schedule a task to run once a day at 01:05 pm UTC in my FastAPI application. How can I achieve this?
3 min read
May 23, 2024
When building a FastAPI application, managing database schema changes can be a daunting task. As your application evolves, your database schema must adapt to accommodate new features, bug fixes, and changing requirements.
5 min read
May 9, 2024
A while ago I wrote a tutorial about how to use Celery with FastAPI to run asynchronous tasks. In this post, I will explain how to dockerize the application and simplify the deployment with Docker Compose.
5 min read
Feb 2, 2024
I recently received an email notifying me about the requirement for KYC verification on Trust Wallet. This is a textbook example of phishing email in the crypto industry.
3 min read
Jan 28, 2024
I have been working on my Podcast Player & Summarizer project and I need to build the component for summarizing a podcast. The main application is built with Next.js but I need the summarizer code to be in Python so I can integrate it to my Audio Transcriber API.
5 min read
Jan 28, 2024
When you have a long running Python function that you want to expose via an API endpoint, you might want to run the function asynchronously to avoid timeouts. Running a function asynchronously means it won't block the rest of your code.
5 min read
Jan 27, 2024
A while ago I was tasked with writing a function to determine whether a string is a palindrome or not in a coding test. A palindrome is a word, phrase, number, or sequence of characters that reads the same forward and backward
3 min read
Aug 21, 2023
Playfair cipher is a type of polygraphic cipher that uses 5x5 grid of letters to encrypt and decrypt messages. It was invented by Sir Charles Wheatstone but it is named after Lord Playfair who promoted its use.
6 min read
Aug 15, 2023
A permutation cipher is a type of encryption that rearranges the letters of a plaintext message according to a predetermined pattern. This pattern is called the "key". Unlike substitution ciphers, which replace characters with other characters, permutation ciphers maintain the original characters but change their order.
4 min read
Aug 10, 2023
The Caesar cipher is a simple way of encrypting and decrypting messages by shifting the letters of the alphabet by a certain number of positions. It was named after Julius Caesar, who used it to communicate with his generals and allies during his military campaigns.
6 min read
Jul 26, 2023
Python is a powerful language that can be used for a variety of purposes, including ethical hacking. In this blog post, we will discuss 14 of the most popular Python libraries you can use for ethical hacking.
8 min read
Jul 21, 2023
Web applications are constantly under attack from malicious actors. These attacks can be costly and disruptive, and they can even lead to the loss of sensitive data.
6 min read
Jul 20, 2023
Port scanning is a technique that allows you to discover which ports are open or closed on a target host or network. Port scanning can be useful for network security, penetration testing, or ethical hacking.
5 min read
Jul 17, 2023
So you’ve heard about the dark web and you have tons of questions about it. Maybe you are just curious or have concerns about getting stumble upon it while browsing the internet. Here is the list of 25 questions that you might ask about the dark web answered.
9 min read
Jul 4, 2023
Phishing emails are a common way for cybercriminals to steal your personal information or to infect your computer with malware. These emails often appear to be from legitimate companies, such as your bank, credit card company, or online retailer. However, they are actually fake. The goal is to trick you into giving up your personal information or clicking on a malicious link.
5 min read
Jul 4, 2023
Tor is a free and open-source software that enables anonymous communication on the Internet. It is often used to protect privacy and security, but it can also be used for a variety of other purposes.
7 min read
Jul 2, 2023
Hacking is the act of gaining unauthorized access to a computer system or network. Hackers can use this access to steal data, disrupt operations, or cause harm. There are many different types of hackers, each with their own motivations and techniques. Some hackers use their skills for good, while others use them for malicious purposes.
5 min read