James MaSecure Coding — Validation and EncodingShield your web application by adopting input validation and output encoding.Oct 14, 20231Oct 14, 20231
James MaSecure Coding for AuthorizationPart 2 of Secure Coding for Software Engineers series.Oct 2, 2023Oct 2, 2023
James MaSecure Coding for AuthenticationPart 1 of Secure Coding for Software Engineers series.Sep 25, 2023Sep 25, 2023
James Ma10 important concepts in cryptography every software engineer should knowCryptographic techniques are methods and processes used in the field of cryptography to secure information and communications by converting…Sep 23, 2023Sep 23, 2023
James MaQuick intro to classful IP addressingAll computers have assigned IP address that are attached to the Internet, or even in your local network. More often than not, your computer…Apr 3, 2022Apr 3, 2022
James MaClassless Inter Domain Routing (CIDR) cheatsheet for IP AddressesIf you’re configuring your cloud VPC (Virtual Private Cloud) resources on AWS, DigitalOcean, or Linode, you’re likely to be asked for IPv4…Apr 3, 2022Apr 3, 2022
James Ma6 Levels of RAID for BackupsYou might want to consider using RAID (Redundant Array of Inexpensive Disk) to protect against loss of data, which helps to make your data…Mar 13, 2022Mar 13, 2022
James Ma5 Benefits of VLANs, and why use themSee how easy it is to configure VLAN on your cloud instance.Mar 13, 2022Mar 13, 2022
James MaThe 7 layers of OSI Model, in picturesIn data networking, you might have come across this term pretty often, the 7 layers of OSI model (Open Systems Interconnection Model)…Mar 12, 2022Mar 12, 2022
James MaReview of Machine Learning with PyTorch and Scikit-LearnNote, this is an expert edition book - I’d expect professional insights from this book.Feb 27, 2022Feb 27, 2022