top of page
Here's a chance to power up your professional life as a software developer. Don't miss out on our latest blogs. Subscribe to our Newsletter today!
Gourav Dhar
Sep 17, 20226 min read
Designing a URL Shortener Application or a Tiny Url/Bitly | System Design
Design a system to shorten urls, i.e when user inputs a long url, the system needs to return a short url.
Gourav Dhar
Sep 12, 20222 min read
Publisher-Subscriber Model — System Design/Architecture
Issues that the Publisher-Subscriber model solves Imagine a case where there is one service calling multiple different services which in...
Gourav Dhar
Aug 29, 20223 min read
What are Crypto-wallets — Exploring Web3
Crypto wallet is a tool that can be used to interact with a blockchain network. By the name crypto wallet, it may seem that it used to...
Gourav Dhar
Aug 22, 20223 min read
Web3 is our opportunity for a better and safer Internet — Evolution of Web
The Evolution of Web The web as we use it today results from its evolution over so many years, just like “Rome wasn’t built in a day”, so...
Gourav Dhar
Aug 15, 20225 min read
So how do blockchains and cryptocurrencies actually work! — Exploring Web3
What is a blockchain? A blockchain is a system of recording transactions in a way that is not controlled by any single entity or...
Gourav Dhar
Aug 8, 20221 min read
How to add a Python library as an AWS layer
A guide on adding a Python library as an AWS layer. Not all libraries are present in the environment provided by AWS lambda (Obviously!...
Gourav Dhar
Aug 1, 20224 min read
How to perform a basic SQL Injection Attack? — Ethical Hacking
How does a SQL Injection attack work? SQL injection attack is possible when a website exposes inputs to be taken from the user and uses...
Gourav Dhar
Jul 25, 20224 min read
How hackers impersonate email-id’s : Email Spoofing and Phishing Attacks
Email Spoofing Email Spoofing is a type of cyber-attack where the attacker sends fake emails which appear to have been sent by a...
Gourav Dhar
Jul 18, 20223 min read
Finding Vulnerable Info Using Google Dorks — Ethical Hacking
Google Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet. What is...
Gourav Dhar
Jul 11, 20225 min read
I created an automated WhatsApp reply bot!
Create a program to reply to WhatsApp messages Opening WhatsApp messages and replying to “Good Morning” texts every day or “Thank You”...
bottom of page