type_of
stringclasses 1
value | id
int64 12
2.31M
| title
stringlengths 1
256
⌀ | description
stringlengths 1
3.47k
⌀ | readable_publish_date
stringlengths 5
10
| slug
stringlengths 2
308
| path
stringlengths 9
316
| url
stringlengths 23
330
| comments_count
int64 -3
1.19k
| public_reactions_count
int64 -82
4.01k
| collection_id
float64 60
30.7k
⌀ | published_timestamp
stringlengths 20
20
| language
stringclasses 95
values | subforem_id
float64 1
1
⌀ | positive_reactions_count
int64 -82
4.01k
| cover_image
stringlengths 61
544
⌀ | social_image
stringlengths 61
544
| canonical_url
stringlengths 15
452
| created_at
stringlengths 20
20
| edited_at
stringlengths 20
20
⌀ | crossposted_at
stringlengths 20
20
⌀ | published_at
stringlengths 20
20
| last_comment_at
stringlengths 20
20
| reading_time_minutes
int64 0
279
| tag_list
stringlengths 5
121
| tags
stringlengths 1
111
| user
stringlengths 509
758
| organization
stringlengths 501
629
⌀ | flare_tag
stringclasses 13
values | __index_level_0__
int64 0
722k
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
article
| 70,358
|
Can you recommend a good operating System Fundamentals book?
|
Hey can anyone recommend a good book on Operating system fundamentals?... Currently looking to buy...
|
Dec 21 '18
|
can-you-recommend-a-good-operating-system-fundamentals-book-4f9a
|
/feresr/can-you-recommend-a-good-operating-system-fundamentals-book-4f9a
|
https://dev.to/feresr/can-you-recommend-a-good-operating-system-fundamentals-book-4f9a
| 2
| 9
| null |
2018-12-21T23:04:01Z
| null | null | 9
| null |
https://dev.to/feresr/can-you-recommend-a-good-operating-system-fundamentals-book-4f9a
|
2018-12-21T23:04:01Z
|
2018-12-21T23:04:42Z
| null |
2018-12-21T23:04:01Z
|
2020-06-04T01:25:41Z
| 1
|
['os', 'operating', 'system', 'book']
|
os, operating, system, book
|
{'name': 'Raviola', 'username': 'feresr', 'twitter_username': 'fernandoraviola', 'github_username': 'feresr', 'user_id': 2544, 'website_url': 'https://feresr.github.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2544%2F9f3ef0a4-be98-49c5-8ac8-1b60017b91fb.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2544%2F9f3ef0a4-be98-49c5-8ac8-1b60017b91fb.jpeg'}
| null | null | 570,405
|
|
article
| 70,097
|
What's New in the Third Edition of Web Development with Django Cookbook?
|
A couple of months ago the third release of Django Cookbook was published under the title Django 2...
|
Dec 21 '18
|
whats-new-in-the-third-edition-of-web-development-with-django-cookbook-57cn
|
/djangotricks/whats-new-in-the-third-edition-of-web-development-with-django-cookbook-57cn
|
https://dev.to/djangotricks/whats-new-in-the-third-edition-of-web-development-with-django-cookbook-57cn
| 1
| 7
| null |
2018-12-21T16:27:54Z
|
en
| null | 7
| null |
https://www.djangotricks.com/blog/2018/12/whats-new-in-the-third-edition-of-web-development-with-django-cookbook/
|
2018-12-20T03:52:09Z
|
2024-12-01T16:51:47Z
|
2018-12-21T16:27:54Z
|
2018-12-19T02:53:00Z
|
2019-01-10T06:55:10Z
| 4
|
['django', 'book', 'intermediate', 'advanced']
|
django, book, intermediate, advanced
|
{'name': 'Aidas Bendoraitis', 'username': 'djangotricks', 'twitter_username': 'DjangoTricks', 'github_username': None, 'user_id': 1653, 'website_url': 'https://www.djangotricks.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1653%2F754fc67d-caa3-49f3-8707-25a2db5db1ba.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1653%2F754fc67d-caa3-49f3-8707-25a2db5db1ba.jpg'}
| null | null | 570,406
|
|
article
| 67,060
|
Building Browser Extension - Book
|
A simple book to get started with Cross Browser WebExtension Development.
|
Dec 5 '18
|
-building-browser-extension---book-7on
|
/iamvp7/-building-browser-extension---book-7on
|
https://dev.to/iamvp7/-building-browser-extension---book-7on
| 6
| 9
| null |
2018-12-05T18:32:11Z
| null | null | 9
| null |
https://dev.to/iamvp7/mozwebext-book/
|
2018-12-05T18:25:13Z
|
2021-09-14T10:15:51Z
| null |
2018-12-05T18:32:11Z
|
2021-09-14T10:16:56Z
| 1
|
['javascript', 'beginners', 'programming', 'book']
|
javascript, beginners, programming, book
|
{'name': 'Viswaprasath', 'username': 'iamvp7', 'twitter_username': 'HeyVP7', 'github_username': 'iamVP7', 'user_id': 26335, 'website_url': 'https://iamvp7.github.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F26335%2F6498f674-07bc-4d73-aad7-8cf8a377f981.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F26335%2F6498f674-07bc-4d73-aad7-8cf8a377f981.jpeg'}
| null | null | 570,407
|
|
article
| 897,407
|
Thoughts on: Elegant Objects
|
Writing things down is part of my learning process. These thoughts came up while reading through...
|
Nov 14 '21
|
thoughts-on-elegant-objects-13a9
|
/vknabel/thoughts-on-elegant-objects-13a9
|
https://dev.to/vknabel/thoughts-on-elegant-objects-13a9
| 0
| 0
| null |
2021-11-14T11:11:20Z
| null | null | 0
| null |
https://www.vknabel.com/pages/Thoughts-on-Elegant-Objects/
|
2021-11-13T19:52:30Z
| null |
2021-11-14T11:11:20Z
|
2018-10-09T00:00:00Z
|
2018-10-09T00:00:00Z
| 9
|
['javascript', 'swift', 'book', 'oop']
|
javascript, swift, book, oop
|
{'name': 'Valentin Knabel', 'username': 'vknabel', 'twitter_username': None, 'github_username': 'vknabel', 'user_id': 493241, 'website_url': 'https://www.vknabel.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F493241%2F6c20798b-de1e-4735-b958-7ac62b467e3c.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F493241%2F6c20798b-de1e-4735-b958-7ac62b467e3c.jpg'}
| null | null | 570,408
|
|
article
| 44,365
|
The top 5 programming books of all time
|
The best programming books of all time
|
Aug 16 '18
|
the-top-5-programming-books-of-all-time-43ef
|
/redfred7/the-top-5-programming-books-of-all-time-43ef
|
https://dev.to/redfred7/the-top-5-programming-books-of-all-time-43ef
| 1
| 16
| null |
2018-08-16T07:13:26Z
| null | null | 16
| null |
https://dev.to/redfred7/the-top-5-programming-books-of-all-time-43ef
|
2018-08-16T05:41:23Z
| null | null |
2018-08-16T07:13:26Z
|
2024-10-17T10:19:49Z
| 3
|
['book', 'programming', 'software']
|
book, programming, software
|
{'name': 'Fred Heath', 'username': 'redfred7', 'twitter_username': None, 'github_username': 'RedFred7', 'user_id': 25920, 'website_url': 'http://www.bootstrap.me.uk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F25920%2Fc241623e-4b5f-4292-ad1d-20fb875230a7.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F25920%2Fc241623e-4b5f-4292-ad1d-20fb875230a7.png'}
| null | null | 570,409
|
|
article
| 34,209
|
I wrote a book
|
Looking back at the last 1.5 year of book writing.
|
Jun 6 '18
|
i-wrote-a-book-lfg
|
/trickvi/i-wrote-a-book-lfg
|
https://dev.to/trickvi/i-wrote-a-book-lfg
| 5
| 16
| null |
2018-06-06T00:15:02Z
| null | null | 16
|
https://dev.to/trickvi/i-wrote-a-book-lfg
|
2018-06-06T00:11:48Z
|
2018-06-06T09:49:34Z
| null |
2018-06-06T00:15:02Z
|
2022-08-11T12:39:19Z
| 7
|
['book', 'writing', 'experience', 'reflections']
|
book, writing, experience, reflections
|
{'name': 'Tryggvi Björgvinsson', 'username': 'trickvi', 'twitter_username': 'trickvi', 'github_username': 'trickvi', 'user_id': 8037, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F8037%2F3489241.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F8037%2F3489241.png'}
| null | null | 570,410
|
||
article
| 36,535
|
Exercises in Programming Style
|
In the book club at work, we recently finished reading Exercises in Programming...
|
Jul 4 '18
|
exercises-in-programming-style-37ag
|
/henrikwarne/exercises-in-programming-style-37ag
|
https://dev.to/henrikwarne/exercises-in-programming-style-37ag
| 0
| 12
| null |
2018-07-04T18:25:06Z
| null | null | 12
| null |
https://henrikwarne.com/2018/03/13/exercises-in-programming-style/
|
2018-06-25T13:52:46Z
| null |
2018-07-04T18:25:06Z
|
2018-03-13T19:30:40Z
|
2018-03-13T19:30:40Z
| 7
|
['learning', 'programming', 'book', 'bookreview']
|
learning, programming, book, bookreview
|
{'name': 'Henrik Warne', 'username': 'henrikwarne', 'twitter_username': 'henrikwarne', 'github_username': None, 'user_id': 80537, 'website_url': 'https://henrikwarne.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F80537%2F2c6c67d6-a9ce-4b54-abc1-008867379f33.JPG', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F80537%2F2c6c67d6-a9ce-4b54-abc1-008867379f33.JPG'}
| null | null | 570,411
|
|
article
| 36,530
|
Developer Testing
|
I recently found out about the book Developer Testing – Building Quality Into S...
|
Jun 28 '18
|
developer-testing-4mgh
|
/henrikwarne/developer-testing-4mgh
|
https://dev.to/henrikwarne/developer-testing-4mgh
| 0
| 12
| null |
2018-06-28T11:04:46Z
| null | null | 12
| null |
https://henrikwarne.com/2017/08/20/developer-testing/
|
2018-06-25T13:52:43Z
| null |
2018-06-28T11:04:46Z
|
2017-08-20T17:16:19Z
|
2017-08-20T17:16:19Z
| 5
|
['programming', 'testing', 'book', 'developertesting']
|
programming, testing, book, developertesting
|
{'name': 'Henrik Warne', 'username': 'henrikwarne', 'twitter_username': 'henrikwarne', 'github_username': None, 'user_id': 80537, 'website_url': 'https://henrikwarne.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F80537%2F2c6c67d6-a9ce-4b54-abc1-008867379f33.JPG', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F80537%2F2c6c67d6-a9ce-4b54-abc1-008867379f33.JPG'}
| null | null | 570,412
|
|
article
| 347,365
|
Let's read No Hard Feelings together!
|
Join a developer book club and become a better developer in 2020.
|
Jun 1 '20
|
let-s-read-no-hard-feelings-together-2nlb
|
/swapagarwal/let-s-read-no-hard-feelings-together-2nlb
|
https://dev.to/swapagarwal/let-s-read-no-hard-feelings-together-2nlb
| 0
| 1
| null |
2020-06-01T10:43:43Z
| null | null | 1
|
https://dev.to/swapagarwal/let-s-read-no-hard-feelings-together-2nlb
|
2020-06-01T10:43:43Z
| null | null |
2020-06-01T10:43:43Z
|
2020-06-01T10:43:43Z
| 1
|
['book', 'career', 'books']
|
book, career, books
|
{'name': 'Swapnil Agarwal', 'username': 'swapagarwal', 'twitter_username': 'SwapAgarwal', 'github_username': 'swapagarwal', 'user_id': 66332, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F66332%2F351a2bef-a844-4328-a4bf-bc19de225710.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F66332%2F351a2bef-a844-4328-a4bf-bc19de225710.jpeg'}
| null | null | 570,413
|
||
article
| 339,441
|
Free book: Deploying Node.js 🚀
|
A free, hands-on book and video course that teaches you how to manage, secure, provision and deploy node.js servers and applications.
|
May 20 '20
|
free-book-deploying-node-js-4n6m
|
/bahdcoder/free-book-deploying-node-js-4n6m
|
https://dev.to/bahdcoder/free-book-deploying-node-js-4n6m
| 0
| 9
| null |
2020-05-20T03:15:35Z
| null | null | 9
|
https://dev.to/bahdcoder/free-book-deploying-node-js-4n6m
|
2020-05-20T03:13:51Z
| null | null |
2020-05-20T03:15:35Z
|
2020-05-20T03:15:35Z
| 1
|
['node', 'javascript', 'devops', 'book']
|
node, javascript, devops, book
|
{'name': 'Kati Frantz', 'username': 'bahdcoder', 'twitter_username': 'bahdcoder', 'github_username': 'bahdcoder', 'user_id': 54584, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F54584%2F6c2417ee-7bfc-4d9b-a1ad-f29be3cefbce.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F54584%2F6c2417ee-7bfc-4d9b-a1ad-f29be3cefbce.jpeg'}
| null | null | 570,414
|
||
article
| 296,590
|
Adventures of a developer team - a short excerpt
|
I am going to publish a new book! :) Check out the very first chapters and tell me your opinions! :)
|
Apr 1 '20
|
adventures-of-a-developer-team-a-short-excerpt-1l0h
|
/leonorader/adventures-of-a-developer-team-a-short-excerpt-1l0h
|
https://dev.to/leonorader/adventures-of-a-developer-team-a-short-excerpt-1l0h
| 4
| 13
| null |
2020-04-01T15:44:27Z
| null | null | 13
|
https://dev.to/leonorader/adventures-of-a-developer-team-a-short-excerpt-1l0h
|
2020-04-01T15:37:35Z
| null | null |
2020-04-01T15:44:27Z
|
2020-04-07T13:50:26Z
| 5
|
['book', 'developers', 'devteam']
|
book, developers, devteam
|
{'name': 'Leonora Der', 'username': 'leonorader', 'twitter_username': 'LeonoraDer', 'github_username': 'leonorader', 'user_id': 77393, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F77393%2Fde43c185-1fc5-418a-8b1f-212078837434.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F77393%2Fde43c185-1fc5-418a-8b1f-212078837434.jpg'}
| null | null | 570,415
|
||
article
| 159,173
|
3 lessons I learned on software development from the book Essentialism: The Disciplined Pursuit of Less by Greg Mckeown
|
In this post, I will share some lessons that I took while reading this amazing book.
|
Sep 3 '19
|
3-lessons-i-learned-on-software-development-from-the-book-essentialism-the-disciplined-pursuit-of-less-by-greg-mckeown-5ecf
|
/educostadev/3-lessons-i-learned-on-software-development-from-the-book-essentialism-the-disciplined-pursuit-of-less-by-greg-mckeown-5ecf
|
https://dev.to/educostadev/3-lessons-i-learned-on-software-development-from-the-book-essentialism-the-disciplined-pursuit-of-less-by-greg-mckeown-5ecf
| 0
| 5
| null |
2019-09-03T11:32:09Z
| null | null | 5
|
https://educosta.dev/blog/3-lessons-on-software-development-from-the-book-essentialism-the-disciplined-pursuit-of-less/
|
2019-08-20T11:33:14Z
|
2019-09-03T11:46:20Z
| null |
2019-09-03T11:32:09Z
|
2019-09-03T11:32:09Z
| 2
|
['software', 'book']
|
software, book
|
{'name': '@educostadev', 'username': 'educostadev', 'twitter_username': 'educostadev', 'github_username': 'educostadev', 'user_id': 164976, 'website_url': 'https://educosta.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F164976%2F611103c3-2285-462e-8877-a70bb951fa55.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F164976%2F611103c3-2285-462e-8877-a70bb951fa55.jpg'}
| null | null | 570,416
|
||
article
| 122,805
|
What are the best C++ books?
|
Can you recommend any good c++ books?
|
Jun 12 '19
|
what-are-the-best-c-books-p22
|
/cankirsallioba/what-are-the-best-c-books-p22
|
https://dev.to/cankirsallioba/what-are-the-best-c-books-p22
| 0
| 3
| null |
2019-06-12T15:37:57Z
| null | null | 3
| null |
https://dev.to/cankirsallioba/what-are-the-best-c-books-p22
|
2019-06-12T15:37:57Z
| null | null |
2019-06-12T15:37:57Z
|
2019-06-12T15:37:57Z
| 1
|
['book']
|
book
|
{'name': 'Can Kirsallioba', 'username': 'cankirsallioba', 'twitter_username': None, 'github_username': 'CanKirsallioba', 'user_id': 172307, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F172307%2F0a2427da-b6fc-49c6-bfa4-4549a55395c0.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F172307%2F0a2427da-b6fc-49c6-bfa4-4549a55395c0.jpeg'}
| null | null | 570,417
|
|
article
| 107,223
|
My Must-Read List of Software Process Books
|
Successful holistic continuous deployment is 20% technology and 80% people. If you want to take full benefit of your continuous deployment capability, it often means that you must make changes in how your teams and company work. Books to the rescue! Janne Sinivirta shares his process book library where you can find inspiration and backup for your gut feelings.
|
May 9 '19
|
my-must-read-list-of-software-process-books-19gh
|
/v3rtti/my-must-read-list-of-software-process-books-19gh
|
https://dev.to/v3rtti/my-must-read-list-of-software-process-books-19gh
| 0
| 5
| null |
2019-05-09T06:33:27Z
| null | null | 5
| null |
https://dev.to/v3rtti/my-must-read-list-of-software-process-books-19gh
|
2019-05-09T06:33:27Z
| null | null |
2019-05-09T06:33:27Z
|
2019-05-09T06:33:27Z
| 5
|
['book', 'lean', 'agile', 'devops']
|
book, lean, agile, devops
|
{'name': 'Janne Sinivirta', 'username': 'v3rtti', 'twitter_username': 'v3rtti', 'github_username': None, 'user_id': 20353, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F20353%2Fc87c45dd-f8e0-4061-89a8-33c6177673e2.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F20353%2Fc87c45dd-f8e0-4061-89a8-33c6177673e2.jpg'}
| null | null | 570,418
|
|
article
| 54,780
|
Programming Little Books
|
Written by others Code Artistry Book Rust The Little Go Book The Little Redis Book The L...
|
Oct 13 '18
|
programming-little-books-5gm7
|
/chenge/programming-little-books-5gm7
|
https://dev.to/chenge/programming-little-books-5gm7
| 0
| 12
| null |
2018-10-13T02:42:13Z
| null | null | 12
| null |
https://dev.to/chenge/programming-little-books-5gm7
|
2018-10-13T02:42:13Z
|
2018-10-15T09:00:50Z
| null |
2018-10-13T02:42:13Z
|
2018-10-13T02:42:13Z
| 1
|
['book', 'little', 'littlebook', 'short']
|
book, little, littlebook, short
|
{'name': 'chenge', 'username': 'chenge', 'twitter_username': None, 'github_username': 'chenge', 'user_id': 32824, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F32824%2Fab03c93c-1b71-4ca3-a77f-6d3e988c0da9.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F32824%2Fab03c93c-1b71-4ca3-a77f-6d3e988c0da9.jpeg'}
| null | null | 570,419
|
|
article
| 46,347
|
Why Are E-Books More Expensive Than Printed Books?
|
Why Are E-Books More Expensive Than Printed Books?
|
Aug 27 '18
|
why-are-e-books-more-expensive-than-printed-books-fcf
|
/erhankilic/why-are-e-books-more-expensive-than-printed-books-fcf
|
https://dev.to/erhankilic/why-are-e-books-more-expensive-than-printed-books-fcf
| 1
| 10
| null |
2018-08-27T12:09:21Z
| null | null | 10
| null |
https://dev.to/erhankilic/why-are-e-books-more-expensive-than-printed-books-fcf
|
2018-08-27T12:09:21Z
| null | null |
2018-08-27T12:09:21Z
|
2018-08-31T22:31:36Z
| 1
|
['ebook', 'book']
|
ebook, book
|
{'name': 'Erhan Kılıç', 'username': 'erhankilic', 'twitter_username': None, 'github_username': 'erhankilic', 'user_id': 28622, 'website_url': 'https://erhankilic.org/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F28622%2F7f076fc0-bdec-4742-8678-c6a864b3245c.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F28622%2F7f076fc0-bdec-4742-8678-c6a864b3245c.jpg'}
| null | null | 570,420
|
|
article
| 42,617
|
Don’t Interpret Me Wrong: Improvising Tests for an Interpreter
|
I’m in love with the Crafting Interpreters book. In it, Bob Nystrom teach us ho...
|
Aug 7 '18
|
dont-interpret-me-wrong-improvising-tests-for-an-interpreter-15je
|
/adambrandizzi/dont-interpret-me-wrong-improvising-tests-for-an-interpreter-15je
|
https://dev.to/adambrandizzi/dont-interpret-me-wrong-improvising-tests-for-an-interpreter-15je
| 0
| 9
| null |
2018-08-07T15:14:12Z
| null | null | 9
| null |
http://suspensao.blog.br/disbelief/dont-interpret-me-wrong-improvising-tests-for-an-interpreter/
|
2018-08-07T15:03:17Z
|
2018-08-07T18:19:43Z
|
2018-08-07T15:14:12Z
|
2018-08-07T14:57:44Z
|
2018-08-07T14:57:44Z
| 0
|
['showdev', 'shellscript', 'testing', 'book']
|
showdev, shellscript, testing, book
|
{'name': 'Adam Brandizzi', 'username': 'adambrandizzi', 'twitter_username': 'adambrandizzi', 'github_username': 'brandizzi', 'user_id': 1591, 'website_url': 'http://adam.brandizzi.com.br/en', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1591%2FfKayanWx.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1591%2FfKayanWx.jpg'}
| null |
{'name': 'showdev', 'bg_color_hex': '#091b47', 'text_color_hex': '#b2ffe1'}
| 570,421
|
|
article
| 336,810
|
Chapter 5: Franc-ly Speaking
|
Chapter 5: Franc-ly Speaking Summary Beck wants to implement multi-currency mul...
|
Jun 29 '20
|
chapter-5-franc-ly-speaking-331j
|
/edgenard/chapter-5-franc-ly-speaking-331j
|
https://dev.to/edgenard/chapter-5-franc-ly-speaking-331j
| 0
| 0
| 5,922
|
2020-06-29T01:08:43Z
| null | null | 0
| null |
http://www.emmanuelgenard.com/tdd_by_example/chapter-5-francly-speaking.html
|
2020-05-16T15:00:33Z
|
2020-06-29T01:13:07Z
|
2020-06-29T01:08:43Z
|
2020-06-28T00:00:00Z
|
2020-06-28T00:00:00Z
| 2
|
['tdd', 'kentbeck', 'book']
|
tdd, kentbeck, book
|
{'name': 'Emmanuel Genard', 'username': 'edgenard', 'twitter_username': None, 'github_username': 'edgenard', 'user_id': 361488, 'website_url': 'http://www.emmanuelgenard.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F361488%2F4c7d058b-12bb-44dc-aae9-0fbbb105a7dc.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F361488%2F4c7d058b-12bb-44dc-aae9-0fbbb105a7dc.jpeg'}
| null | null | 570,422
|
|
article
| 2,076,439
|
Hi this my 1st post
|
History of dark web and linux architecture Dark Web history Linux architecture
|
Nov 4 '24
|
hi-this-my-new-post-1iab
|
/souvik_dey_webdev/hi-this-my-new-post-1iab
|
https://dev.to/souvik_dey_webdev/hi-this-my-new-post-1iab
| 0
| 0
| null |
2024-11-04T11:42:19Z
| null | null | 0
|
https://dev.to/souvik_dey_webdev/hi-this-my-new-post-1iab
|
2024-11-04T11:42:20Z
|
2024-11-04T12:03:37Z
| null |
2024-11-04T11:42:19Z
|
2024-11-04T11:42:19Z
| 1
|
['darkweb', 'hack', 'hacker']
|
darkweb, hack, hacker
|
{'name': 'Souvik Dey', 'username': 'souvik_dey_webdev', 'twitter_username': None, 'github_username': None, 'user_id': 2343114, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2343114%2F4048bb13-825b-4051-b890-0e5de1688adf.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2343114%2F4048bb13-825b-4051-b890-0e5de1688adf.png'}
| null | null | 570,423
|
||
article
| 1,875,111
|
"Is there a mod available for Stumble Guys? Or any hacks?"
|
Is there really any website available that provides a mod for Stumble Guys with unlimited money and...
|
Jun 3 '24
|
is-there-a-mod-available-for-stumble-guys-or-any-hacks-12np
|
/abeeb/is-there-a-mod-available-for-stumble-guys-or-any-hacks-12np
|
https://dev.to/abeeb/is-there-a-mod-available-for-stumble-guys-or-any-hacks-12np
| 0
| 0
| null |
2024-06-03T09:13:27Z
|
en
| null | 0
| null |
https://dev.to/abeeb/is-there-a-mod-available-for-stumble-guys-or-any-hacks-12np
|
2024-06-03T09:13:27Z
|
2024-06-03T17:27:13Z
| null |
2024-06-03T09:13:27Z
|
2024-06-03T09:13:27Z
| 1
|
['mod', 'hack']
|
mod, hack
|
{'name': 'AhmedBeeb', 'username': 'abeeb', 'twitter_username': None, 'github_username': 'iruffysmith', 'user_id': 1276165, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1276165%2F2cd633a3-1f64-4bd3-a853-5439b7339616.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1276165%2F2cd633a3-1f64-4bd3-a853-5439b7339616.jpg'}
| null | null | 570,424
|
|
article
| 1,841,415
|
CSS Hack: "Named Layers"
|
Managing values for `z-index` is a pain. Often we resort to really high numbers to make sure things are definitely on top, only to then find out we want something to be on top of it. Here is a convenient hack to make this easier to manage.
|
May 3 '24
|
css-hack-named-layers-1ap7
|
/darkwiiplayer/css-hack-named-layers-1ap7
|
https://dev.to/darkwiiplayer/css-hack-named-layers-1ap7
| 5
| 24
| null |
2024-05-03T10:49:12Z
|
en
| null | 24
|
https://dev.to/darkwiiplayer/css-hack-named-layers-1ap7
|
2024-05-03T10:49:12Z
|
2024-05-03T10:51:22Z
| null |
2024-05-03T10:49:12Z
|
2024-05-07T06:58:09Z
| 2
|
['css', 'hack', 'zindex', 'beginners']
|
css, hack, zindex, beginners
|
{'name': '𒎏Wii 🏳️\u200d⚧️', 'username': 'darkwiiplayer', 'twitter_username': None, 'github_username': 'DarkWiiPlayer', 'user_id': 119538, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F119538%2F280c8527-9b9c-420b-9d09-f9b69d16fc3b.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F119538%2F280c8527-9b9c-420b-9d09-f9b69d16fc3b.png'}
| null | null | 570,425
|
||
article
| 1,820,277
|
HOW TO TELL YOUR PARTNER IS CHEATING; CYBERPUNK PROGRAMMERS
|
HOW TO TELL YOUR PARTNER IS CHEATING; CYBERPUNK PROGRAMMERS Though most cheating involves sex, it is...
|
Apr 12 '24
|
how-to-tell-your-partner-is-cheating-cyberpunk-programmers-3391
|
/zaynab173/how-to-tell-your-partner-is-cheating-cyberpunk-programmers-3391
|
https://dev.to/zaynab173/how-to-tell-your-partner-is-cheating-cyberpunk-programmers-3391
| 0
| 0
| null |
2024-04-12T19:54:49Z
|
en
| null | 0
| null |
https://dev.to/zaynab173/how-to-tell-your-partner-is-cheating-cyberpunk-programmers-3391
|
2024-04-12T19:54:49Z
| null | null |
2024-04-12T19:54:49Z
|
2024-04-12T19:54:49Z
| 1
|
['hack', 'phone', 'hire', 'hacker']
|
hack, phone, hire, hacker
|
{'name': 'Zaynab Alondra', 'username': 'zaynab173', 'twitter_username': None, 'github_username': None, 'user_id': 1421852, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1421852%2Fd046341d-5baa-4c12-bfc8-02d15f9bb4de.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1421852%2Fd046341d-5baa-4c12-bfc8-02d15f9bb4de.png'}
| null | null | 570,426
|
|
article
| 1,798,997
|
Automatically Change IP Address تغير اي بي بشكل تلقائي كالي لينكس
|
السلام عليكم متابعين قناة ومدونة Shadow Hacker في هذا المقال سوف استعرض معكم أـداة رائعه تسمى...
|
Mar 22 '24
|
automatically-change-ip-address-tgyr-y-by-bshkl-tlqyy-kly-lynks-5ag
|
/shadowhackrs/automatically-change-ip-address-tgyr-y-by-bshkl-tlqyy-kly-lynks-5ag
|
https://dev.to/shadowhackrs/automatically-change-ip-address-tgyr-y-by-bshkl-tlqyy-kly-lynks-5ag
| 0
| 0
| null |
2024-03-22T22:36:04Z
|
ar
| null | 0
| null |
https://dev.to/shadowhackrs/automatically-change-ip-address-tgyr-y-by-bshkl-tlqyy-kly-lynks-5ag
|
2024-03-22T22:36:06Z
| null | null |
2024-03-22T22:36:04Z
|
2024-03-22T22:36:04Z
| 1
|
['hack', 'hacker', 'kalilinux', 'termux']
|
hack, hacker, kalilinux, termux
|
{'name': 'Shadow Hacker', 'username': 'shadowhackrs', 'twitter_username': 'Tareq_Shadow', 'github_username': 'ShadowHackrs', 'user_id': 1008922, 'website_url': 'https://www.shadowhackr.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1008922%2F5af5e4d6-e1a4-409b-8fda-b828c48de054.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1008922%2F5af5e4d6-e1a4-409b-8fda-b828c48de054.png'}
| null | null | 570,427
|
|
article
| 1,320,665
|
The Anatomy of a PostgreSQL Hack: How It Happened and What We Did About It.
|
This article explains inner working of a recent PostgreSQL database attack that we faced and how to fix it.
|
Feb 10 '23
|
the-anatomy-of-a-postgresql-hack-how-it-happened-and-what-we-did-about-it-b9k
|
/jaytailor45/the-anatomy-of-a-postgresql-hack-how-it-happened-and-what-we-did-about-it-b9k
|
https://dev.to/jaytailor45/the-anatomy-of-a-postgresql-hack-how-it-happened-and-what-we-did-about-it-b9k
| 0
| 4
| null |
2023-02-10T11:20:26Z
|
en
| null | 4
| null |
https://dev.to/jaytailor45/the-anatomy-of-a-postgresql-hack-how-it-happened-and-what-we-did-about-it-b9k
|
2023-01-07T11:01:03Z
|
2023-02-25T08:44:49Z
| null |
2023-02-10T11:20:26Z
|
2023-02-10T11:20:26Z
| 3
|
['postgres', 'hack', 'database', 'security']
|
postgres, hack, database, security
|
{'name': 'Jay Tailor', 'username': 'jaytailor45', 'twitter_username': 'JayTailor45', 'github_username': 'JayTailor45', 'user_id': 163359, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F163359%2Fa4f0dd17-38a2-4a6a-9bcc-e367b9f6b6ca.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F163359%2Fa4f0dd17-38a2-4a6a-9bcc-e367b9f6b6ca.png'}
| null | null | 570,428
|
|
article
| 1,199,999
|
What can be done with an IP address?
|
What can be done with an IP address? sounds a simple question but the answer is not so simple. Some...
|
Sep 22 '22
|
what-can-be-done-with-an-ip-address-33bc
|
/hackelite01/what-can-be-done-with-an-ip-address-33bc
|
https://dev.to/hackelite01/what-can-be-done-with-an-ip-address-33bc
| 2
| 5
| null |
2022-09-22T09:11:01Z
|
en
| null | 5
|
https://dev.to/hackelite01/what-can-be-done-with-an-ip-address-33bc
|
2022-09-22T09:11:02Z
| null | null |
2022-09-22T09:11:01Z
|
2023-01-20T15:56:56Z
| 4
|
['ipaddress', 'hack', 'hackelite01', 'security']
|
ipaddress, hack, hackelite01, security
|
{'name': 'Mayank Rajput (HackElite)', 'username': 'hackelite01', 'twitter_username': None, 'github_username': 'hackelite01', 'user_id': 742025, 'website_url': 'https://mayankrajput.ml', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F742025%2F9547cc82-9577-4d64-ad8c-a32634fb8026.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F742025%2F9547cc82-9577-4d64-ad8c-a32634fb8026.jpeg'}
| null | null | 570,429
|
||
article
| 1,131,559
|
Are you ready for an amazing competition? 5000000 CCM for the prize
|
We have created a new version of CCNet for privacy purposes. This version includes PTS (Public Token...
|
Jul 4 '22
|
are-you-ready-for-an-amazing-competition-5000000-ccm-for-the-prize-2m86
|
/jahongir2007/are-you-ready-for-an-amazing-competition-5000000-ccm-for-the-prize-2m86
|
https://dev.to/jahongir2007/are-you-ready-for-an-amazing-competition-5000000-ccm-for-the-prize-2m86
| 0
| 9
| null |
2022-07-04T12:27:07Z
| null | null | 9
|
https://dev.to/jahongir2007/are-you-ready-for-an-amazing-competition-5000000-ccm-for-the-prize-2m86
|
2022-07-04T12:27:07Z
| null | null |
2022-07-04T12:27:07Z
|
2022-07-04T12:27:07Z
| 1
|
['hack', 'competition', 'cryptum']
|
hack, competition, cryptum
|
{'name': 'Jahongir Sobirov', 'username': 'jahongir2007', 'twitter_username': 'JahongirSobiro6', 'github_username': 'Jahongir2007', 'user_id': 592564, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F592564%2Ff901f5cf-c366-48d2-a110-e805b76702ae.gif', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F592564%2Ff901f5cf-c366-48d2-a110-e805b76702ae.gif'}
| null | null | 570,430
|
||
article
| 1,090,949
|
Emulate middle mouse when the actual one does not work
|
The scenario: The old school boys like me that started using Linux when you had to...
|
May 20 '22
|
emulade-middle-mouse-when-the-actual-one-does-not-work-35ja
|
/voyeg3r/emulade-middle-mouse-when-the-actual-one-does-not-work-35ja
|
https://dev.to/voyeg3r/emulade-middle-mouse-when-the-actual-one-does-not-work-35ja
| 1
| 6
| null |
2022-05-20T13:51:22Z
| null | null | 6
|
https://dev.to/voyeg3r/emulade-middle-mouse-when-the-actual-one-does-not-work-35ja
|
2022-05-20T13:31:14Z
|
2022-05-21T01:10:16Z
| null |
2022-05-20T13:51:22Z
|
2022-05-26T19:57:35Z
| 3
|
['linux', 'hack', 'xinput', 'xvkbd']
|
linux, hack, xinput, xvkbd
|
{'name': 'Sérgio Araújo', 'username': 'voyeg3r', 'twitter_username': 'voyeg3r', 'github_username': 'voyeg3r', 'user_id': 34076, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F34076%2F649c002e-282e-4ce4-9a79-c37fc2c5b532.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F34076%2F649c002e-282e-4ce4-9a79-c37fc2c5b532.png'}
| null | null | 570,431
|
||
article
| 1,052,567
|
How To Access Private Class Members in TypeScript
|
I know we shouldn't access private class members. But sometimes, there is simply no way around. For...
|
Apr 12 '22
|
hack-access-private-class-members-in-typescript-41jp
|
/zirkelc/hack-access-private-class-members-in-typescript-41jp
|
https://dev.to/zirkelc/hack-access-private-class-members-in-typescript-41jp
| 3
| 17
| null |
2022-04-12T09:05:23Z
| null | null | 17
| null |
https://dev.to/zirkelc/hack-access-private-class-members-in-typescript-41jp
|
2022-04-12T09:05:23Z
|
2023-04-20T08:32:08Z
| null |
2022-04-12T09:05:23Z
|
2024-01-22T07:12:19Z
| 1
|
['typescript', 'productivity', 'hack', 'testing']
|
typescript, productivity, hack, testing
|
{'name': 'Chris Cook', 'username': 'zirkelc', 'twitter_username': None, 'github_username': 'zirkelc', 'user_id': 632215, 'website_url': 'https://zirkelc.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F632215%2F83b13af4-ca36-4ceb-8c38-40737fe8087a.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F632215%2F83b13af4-ca36-4ceb-8c38-40737fe8087a.jpg'}
| null | null | 570,432
|
|
article
| 856,607
|
How to pass props object from child component to parent
|
Before starting the topics let me tell me this is a hack I just found this today when I am doing my...
|
Oct 8 '21
|
how-to-pass-props-object-from-child-component-to-parent-2a8d
|
/hareom284/how-to-pass-props-object-from-child-component-to-parent-2a8d
|
https://dev.to/hareom284/how-to-pass-props-object-from-child-component-to-parent-2a8d
| 0
| 5
| null |
2021-10-08T17:28:29Z
|
en
| null | 5
|
https://dev.to/hareom284/how-to-pass-props-object-from-child-component-to-parent-2a8d
|
2021-10-08T17:28:29Z
|
2021-10-09T14:07:23Z
| null |
2021-10-08T17:28:29Z
|
2021-10-08T17:28:29Z
| 2
|
['react', 'hack', 'trick', 'webdev']
|
react, hack, trick, webdev
|
{'name': 'Harry', 'username': 'hareom284', 'twitter_username': 'hareom284', 'github_username': 'hareom284', 'user_id': 485931, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F485931%2F2fbf3af4-da22-4644-abfb-7dafdf26ad48.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F485931%2F2fbf3af4-da22-4644-abfb-7dafdf26ad48.jpg'}
| null | null | 570,434
|
||
article
| 799,331
|
Writeup: HackTheBox Valentine - Without Metasploit (OSCP Prep)
|
Hello Again! Just did Valentine from HackTheBox and wanted to provide a write up. Let's Begin! ...
|
Aug 23 '21
|
writeup-hackthebox-valentine-without-metasploit-oscp-prep-28dg
|
/xyzchris0/writeup-hackthebox-valentine-without-metasploit-oscp-prep-28dg
|
https://dev.to/xyzchris0/writeup-hackthebox-valentine-without-metasploit-oscp-prep-28dg
| 0
| 2
| null |
2021-08-23T15:50:58Z
|
en
| null | 2
|
https://dev.to/xyzchris0/writeup-hackthebox-valentine-without-metasploit-oscp-prep-28dg
|
2021-08-21T19:32:36Z
| null | null |
2021-08-23T15:50:58Z
|
2021-08-23T15:50:58Z
| 4
|
['cybersecurity', 'hack', 'python']
|
cybersecurity, hack, python
|
{'name': 'Chris', 'username': 'xyzchris0', 'twitter_username': None, 'github_username': '0xHuey', 'user_id': 382144, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F382144%2F73fade57-1f43-40be-92a5-85eeaf77dd48.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F382144%2F73fade57-1f43-40be-92a5-85eeaf77dd48.png'}
| null | null | 570,435
|
||
article
| 779,855
|
Run uTorrent on Windows 10 or 11
|
Note: Usage of Torrents is banned in some parts of the world. Make sure you are doing this legally....
|
Aug 3 '21
|
run-utorrent-on-windows-10-or-11-13h1
|
/mursalfk/run-utorrent-on-windows-10-or-11-13h1
|
https://dev.to/mursalfk/run-utorrent-on-windows-10-or-11-13h1
| 0
| 2
| null |
2021-08-03T04:20:14Z
|
en
| null | 2
|
https://dev.to/mursalfk/run-utorrent-on-windows-10-or-11-13h1
|
2021-08-03T04:20:14Z
| null | null |
2021-08-03T04:20:14Z
|
2021-08-03T04:20:14Z
| 2
|
['hack', 'torrent', 'utorrent', 'tor']
|
hack, torrent, utorrent, tor
|
{'name': 'Mursal Furqan Kumbhar', 'username': 'mursalfk', 'twitter_username': 'mursalfurqan', 'github_username': 'mursalfk', 'user_id': 202358, 'website_url': 'https://mursalfk.github.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F202358%2F2fbf2caa-6490-4caa-a0aa-f128a9ade35a.gif', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F202358%2F2fbf2caa-6490-4caa-a0aa-f128a9ade35a.gif'}
| null | null | 570,436
|
||
article
| 728,066
|
How !to make a calling app in Flutter for Android devices
|
Disclaimer- That ! in the title is not a typo, read it as not. This article is not a tutorial about...
|
Jun 14 '21
|
how-to-make-a-calling-app-in-flutter-for-android-devices-3hpg
|
/chinmaykb/how-to-make-a-calling-app-in-flutter-for-android-devices-3hpg
|
https://dev.to/chinmaykb/how-to-make-a-calling-app-in-flutter-for-android-devices-3hpg
| 9
| 32
| null |
2021-06-14T16:29:17Z
|
en
| null | 32
|
https://dev.to/chinmaykb/how-to-make-a-calling-app-in-flutter-for-android-devices-3hpg
|
2021-06-14T16:29:17Z
|
2021-06-15T07:54:48Z
| null |
2021-06-14T16:29:17Z
|
2024-03-22T22:20:25Z
| 7
|
['flutter', 'android', 'plugin', 'hack']
|
flutter, android, plugin, hack
|
{'name': 'Chinmay Kabi', 'username': 'chinmaykb', 'twitter_username': 'ChinuKabi', 'github_username': 'Chinmay-KB', 'user_id': 486167, 'website_url': 'https://chinmaykabi.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F486167%2F2cf6daba-3640-4905-af84-01da1daaa5ae.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F486167%2F2cf6daba-3640-4905-af84-01da1daaa5ae.jpeg'}
| null | null | 570,437
|
||
article
| 705,632
|
Hacking third-party APIs on the JVM
|
The JVM ecosystem is mature and offers plenty of libraries, so you don't need to reinvent the wheel....
|
May 23 '21
|
hacking-third-party-apis-on-the-jvm-579o
|
/nfrankel/hacking-third-party-apis-on-the-jvm-579o
|
https://dev.to/nfrankel/hacking-third-party-apis-on-the-jvm-579o
| 0
| 6
| null |
2021-05-23T15:42:58Z
|
en
| null | 6
|
https://blog.frankel.ch/hacking-third-party-api-jvm/
|
2021-05-22T11:35:40Z
| null | null |
2021-05-23T15:42:58Z
|
2021-05-23T15:42:58Z
| 8
|
['java', 'hack', 'api']
|
java, hack, api
|
{'name': 'Nicolas Fränkel', 'username': 'nfrankel', 'twitter_username': 'nicolas_frankel', 'github_username': 'nfrankel', 'user_id': 362557, 'website_url': 'https://blog.frankel.ch/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F362557%2F479d9637-2db0-4b0a-8070-edbe538c4180.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F362557%2F479d9637-2db0-4b0a-8070-edbe538c4180.jpg'}
| null | null | 570,438
|
||
article
| 650,405
|
Nevertheless, She Persisted... And Got a Job!
|
5 years ago I wouldn't have imagined being a Security Consultant. In 2016 I was studying Information...
|
Mar 31 '21
|
nevertheless-she-persisted-and-got-a-job-5dej
|
/caffiendkitten/nevertheless-she-persisted-and-got-a-job-5dej
|
https://dev.to/caffiendkitten/nevertheless-she-persisted-and-got-a-job-5dej
| 0
| 10
| null |
2021-03-31T22:48:20Z
|
en
| null | 10
| null |
https://dev.to/caffiendkitten/nevertheless-she-persisted-and-got-a-job-5dej
|
2021-03-30T20:18:39Z
| null | null |
2021-03-31T22:48:20Z
|
2021-03-31T22:48:20Z
| 4
|
['wecoded', 'security', 'codenewbie', 'hack']
|
wecoded, security, codenewbie, hack
|
{'name': 'DaNeil C', 'username': 'caffiendkitten', 'twitter_username': None, 'github_username': 'caffiendkitten', 'user_id': 176046, 'website_url': 'https://caffiendkitten.github.io/#/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F176046%2Fda23df9e-2327-4d27-9900-81b8e3baa830.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F176046%2Fda23df9e-2327-4d27-9900-81b8e3baa830.png'}
| null | null | 570,439
|
|
article
| 644,088
|
You can 'HACK' any website!
|
A post by Virej Dasani
|
Mar 24 '21
|
you-can-hack-any-website-102m
|
/virejdasani/you-can-hack-any-website-102m
|
https://dev.to/virejdasani/you-can-hack-any-website-102m
| 8
| 16
| null |
2021-03-24T06:42:59Z
|
en
| null | 16
|
http://www.virej.ml/blogs/HackThisPage.html
|
2021-03-24T06:42:59Z
|
2021-03-24T06:45:26Z
| null |
2021-03-24T06:42:59Z
|
2021-12-24T12:40:25Z
| 1
|
['hack', 'javascript', 'html', 'css']
|
hack, javascript, html, css
|
{'name': 'Virej Dasani', 'username': 'virejdasani', 'twitter_username': 'VirejDasani', 'github_username': 'virejdasani', 'user_id': 602703, 'website_url': 'https://virejdasani.github.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F602703%2Fe0048341-e5b2-4085-be25-33501b1d6527.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F602703%2Fe0048341-e5b2-4085-be25-33501b1d6527.png'}
| null | null | 570,440
|
||
article
| 623,227
|
How react-native-config make my life easier to steal secret keys of your React Native Application
|
1) First, you need to find out an applicationId of app. It easy to use a Google Play website, just...
|
Mar 2 '21
|
how-react-native-config-make-my-life-easier-to-steal-secret-keys-of-your-react-native-application-237b
|
/retyui/how-react-native-config-make-my-life-easier-to-steal-secret-keys-of-your-react-native-application-237b
|
https://dev.to/retyui/how-react-native-config-make-my-life-easier-to-steal-secret-keys-of-your-react-native-application-237b
| 0
| 5
| null |
2021-03-02T22:57:39Z
|
en
| null | 5
|
https://dev.to/retyui/how-react-native-config-make-my-life-easier-to-steal-secret-keys-of-your-react-native-application-237b
|
2021-03-02T22:08:43Z
|
2022-06-29T06:53:06Z
| null |
2021-03-02T22:57:39Z
|
2021-03-02T22:57:39Z
| 1
|
['reactnative', 'security', 'hack']
|
reactnative, security, hack
|
{'name': 'Davyd NRB', 'username': 'retyui', 'twitter_username': None, 'github_username': 'retyui', 'user_id': 162965, 'website_url': 'https://bit.ly/offantik-cv', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F162965%2F8f92c752-f9da-474e-b34f-2cd10bb6b1dd.gif', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F162965%2F8f92c752-f9da-474e-b34f-2cd10bb6b1dd.gif'}
| null | null | 570,441
|
||
article
| 574,157
|
My Local Hack Day - BUILD 2021 Experience | Major Hacking League | Guild: Devscript Winter Of Code
|
Hey everyone! Here I am attending another awesome event organized by the Major League Hacking Communi...
|
Jan 17 '21
|
my-local-hack-day-2021-experience-major-hacking-league-guild-devscript-winter-of-code-3nnd
|
/ananya0504/my-local-hack-day-2021-experience-major-hacking-league-guild-devscript-winter-of-code-3nnd
|
https://dev.to/ananya0504/my-local-hack-day-2021-experience-major-hacking-league-guild-devscript-winter-of-code-3nnd
| 0
| 0
| null |
2021-01-17T15:06:48Z
|
en
| null | 0
|
https://dev.to/ananya0504/my-local-hack-day-2021-experience-major-hacking-league-guild-devscript-winter-of-code-3nnd
|
2021-01-17T15:06:48Z
|
2021-01-17T15:14:51Z
| null |
2021-01-17T15:06:48Z
|
2021-01-17T15:06:48Z
| 1
|
['localhackday', 'mlh', 'majorleaguehacking', 'hack']
|
localhackday, mlh, majorleaguehacking, hack
|
{'name': 'Ananya Gupta', 'username': 'ananya0504', 'twitter_username': 'Ananya0504', 'github_username': 'ananya0504', 'user_id': 478548, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F478548%2F82ec5eac-4743-49c4-ac46-c6d76474256f.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F478548%2F82ec5eac-4743-49c4-ac46-c6d76474256f.jpeg'}
| null | null | 570,442
|
||
article
| 574,310
|
My Local Hack Day - BUILD 2021 Experience | Major Hacking League | Guild: Devscript Winter Of Code
|
Hey everyone! Here I am attending another awesome event organized by the Major League Hacking Communi...
|
Jan 17 '21
|
my-local-hack-day-build-2021-experience-major-hacking-league-guild-devscript-winter-of-code-mb3
|
/muthuannamalai12/my-local-hack-day-build-2021-experience-major-hacking-league-guild-devscript-winter-of-code-mb3
|
https://dev.to/muthuannamalai12/my-local-hack-day-build-2021-experience-major-hacking-league-guild-devscript-winter-of-code-mb3
| 0
| 3
| null |
2021-01-17T18:37:08Z
|
en
| null | 3
|
https://dev.to/muthuannamalai12/my-local-hack-day-build-2021-experience-major-hacking-league-guild-devscript-winter-of-code-mb3
|
2021-01-17T18:37:08Z
|
2021-01-17T18:40:21Z
| null |
2021-01-17T18:37:08Z
|
2021-01-17T18:37:08Z
| 1
|
['localhackday', 'mlh', 'majorleaguehacking', 'hack']
|
localhackday, mlh, majorleaguehacking, hack
|
{'name': 'Muthu Annamalai Venkatachalam', 'username': 'muthuannamalai12', 'twitter_username': 'muthuannamalai_', 'github_username': 'muthuannamalai12', 'user_id': 561644, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F561644%2F95b85f88-c16f-4b47-8552-b085d58e4362.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F561644%2F95b85f88-c16f-4b47-8552-b085d58e4362.jpeg'}
| null | null | 570,444
|
||
article
| 512,748
|
Study Hack (That Works for Me) 2020
|
Watch/Listen to tutorials at 2x speed! Watching videos, listening to podcasts, and...
|
Nov 12 '20
|
best-study-trick-that-works-for-me-2020-4cad
|
/jonathanodle/best-study-trick-that-works-for-me-2020-4cad
|
https://dev.to/jonathanodle/best-study-trick-that-works-for-me-2020-4cad
| 0
| 1
| null |
2020-11-12T06:29:44Z
|
en
| null | 1
| null |
https://dev.to/jonathanodle/best-study-trick-that-works-for-me-2020-4cad
|
2020-11-12T06:29:44Z
|
2022-02-02T20:27:09Z
| null |
2020-11-12T06:29:44Z
|
2020-11-12T06:29:44Z
| 1
|
['productivity', 'learning', 'hack', 'tips']
|
productivity, learning, hack, tips
|
{'name': 'Jonathan Odle', 'username': 'jonathanodle', 'twitter_username': 'JonathanOdle', 'github_username': 'jonathanOdle', 'user_id': 499063, 'website_url': 'https://odleworks.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F499063%2F66c627b8-6b0e-4bec-8ce0-bbaed217ca4b.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F499063%2F66c627b8-6b0e-4bec-8ce0-bbaed217ca4b.jpg'}
| null | null | 570,445
|
|
article
| 508,445
|
The Fixed Line Mystery...
|
A few days ago I deiced to open up my SSH to the internet. Possibly not the greatest idea, but I ha...
|
Nov 6 '20
|
the-fixed-line-mystery-46de
|
/riversiderocks/the-fixed-line-mystery-46de
|
https://dev.to/riversiderocks/the-fixed-line-mystery-46de
| 4
| 7
| null |
2020-11-06T23:20:01Z
|
en
| null | 7
| null |
https://dev.to/riversiderocks/the-fixed-line-mystery-46de
|
2020-11-06T23:10:33Z
|
2020-11-06T23:21:12Z
| null |
2020-11-06T23:20:01Z
|
2022-01-21T18:02:33Z
| 2
|
['hack', 'ip']
|
hack, ip
|
{'name': 'RiversideRocks', 'username': 'riversiderocks', 'twitter_username': None, 'github_username': 'RiversideRocks', 'user_id': 340100, 'website_url': 'https://riverside.rocks', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F340100%2F99b74161-3176-449e-b50e-9eae2fcbfaa7.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F340100%2F99b74161-3176-449e-b50e-9eae2fcbfaa7.jpeg'}
| null | null | 570,446
|
|
article
| 501,565
|
Writing a dog picture browser in ~200 lines of code
|
How I used an open dog picture API and some CSS and JavaScript to build a dog browser.
|
Oct 29 '20
|
writing-a-dog-picture-browser-in-200-lines-of-code-23j6
|
/codepo8/writing-a-dog-picture-browser-in-200-lines-of-code-23j6
|
https://dev.to/codepo8/writing-a-dog-picture-browser-in-200-lines-of-code-23j6
| 2
| 21
| null |
2020-10-29T21:32:24Z
|
en
| null | 21
|
https://dev.to/codepo8/writing-a-dog-picture-browser-in-200-lines-of-code-23j6
|
2020-10-29T21:07:41Z
| null | null |
2020-10-29T21:32:24Z
|
2022-01-02T23:46:21Z
| 7
|
['javascript', 'css', 'webdev', 'hack']
|
javascript, css, webdev, hack
|
{'name': 'Christian Heilmann', 'username': 'codepo8', 'twitter_username': 'codepo8', 'github_username': 'codepo8', 'user_id': 110884, 'website_url': 'https://christianheilmann.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F110884%2Fc4807448-b7fe-4d8d-ba13-a3ec4c97b377.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F110884%2Fc4807448-b7fe-4d8d-ba13-a3ec4c97b377.jpeg'}
| null | null | 570,447
|
||
article
| 420,567
|
Hack protected WPA/WPA2 Wi-fi
|
Use Kali Linux to get WPA/WPA2 password of Wi-fi
|
Aug 6 '20
|
hack-protected-wpa-wpa2-wi-fi-3ph2
|
/madeindjs/hack-protected-wpa-wpa2-wi-fi-3ph2
|
https://dev.to/madeindjs/hack-protected-wpa-wpa2-wi-fi-3ph2
| 0
| 15
| null |
2020-08-06T15:42:54Z
|
en
| null | 15
|
https://dev.to/madeindjs/hack-protected-wpa-wpa2-wi-fi-3ph2
|
2020-08-06T15:42:54Z
| null | null |
2020-08-06T15:42:54Z
|
2020-08-06T15:42:54Z
| 5
|
['hack', 'kali', 'wifi', 'wpa']
|
hack, kali, wifi, wpa
|
{'name': 'Alexandre Rousseau', 'username': 'madeindjs', 'twitter_username': None, 'github_username': 'madeindjs', 'user_id': 54985, 'website_url': 'http://rousseau-alexandre.fr', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F54985%2F098c9103-0fd4-4451-adca-9815893809f8.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F54985%2F098c9103-0fd4-4451-adca-9815893809f8.jpeg'}
| null | null | 570,448
|
||
article
| 208,292
|
The Evil JavaScript eval()
|
So you need to handle some user input The Evil eval() eval() is a global function in Jav...
|
Jul 22 '20
|
the-evil-javascript-eval-28ig
|
/caffiendkitten/the-evil-javascript-eval-28ig
|
https://dev.to/caffiendkitten/the-evil-javascript-eval-28ig
| 0
| 9
| null |
2020-07-22T20:35:55Z
|
en
| null | 9
| null |
https://dev.to/caffiendkitten/the-evil-javascript-eval-28ig
|
2019-11-19T19:54:20Z
| null | null |
2020-07-22T20:35:55Z
|
2020-07-22T20:35:55Z
| 3
|
['codenewbie', 'security', 'javascript', 'hack']
|
codenewbie, security, javascript, hack
|
{'name': 'DaNeil C', 'username': 'caffiendkitten', 'twitter_username': None, 'github_username': 'caffiendkitten', 'user_id': 176046, 'website_url': 'https://caffiendkitten.github.io/#/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F176046%2Fda23df9e-2327-4d27-9900-81b8e3baa830.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F176046%2Fda23df9e-2327-4d27-9900-81b8e3baa830.png'}
| null | null | 570,449
|
|
article
| 359,691
|
Replacing empty <img> src attributes using JavaScript.
|
If you find yourself in the middle of a project where some of the images for your website are not...
|
Jun 20 '20
|
replacing-empty-img-src-attributes-using-javascript-2pc8
|
/santiagocodes/replacing-empty-img-src-attributes-using-javascript-2pc8
|
https://dev.to/santiagocodes/replacing-empty-img-src-attributes-using-javascript-2pc8
| 0
| 7
| null |
2020-06-20T14:37:50Z
| null | null | 7
|
https://dev.to/santiagocodes/replacing-empty-img-src-attributes-using-javascript-2pc8
|
2020-06-20T13:56:51Z
|
2022-02-20T11:23:57Z
| null |
2020-06-20T14:37:50Z
|
2021-01-19T19:27:54Z
| 3
|
['javascript', 'tutorial', 'codenewbie', 'hack']
|
javascript, tutorial, codenewbie, hack
|
{'name': 'Maria del Carmen Santiago', 'username': 'santiagocodes', 'twitter_username': 'maricstgo', 'github_username': None, 'user_id': 412646, 'website_url': 'https://santiagocodes.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F412646%2Fe3d174f2-d7ac-46ed-ad4d-8b20af6e76f3.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F412646%2Fe3d174f2-d7ac-46ed-ad4d-8b20af6e76f3.jpg'}
| null | null | 570,450
|
||
article
| 356,240
|
Generate Generators Repeatedly
|
Hack a generator to produce results repeatedly.
|
Jun 15 '20
|
generate-generators-repeatedly-2jd8
|
/billah_tishad/generate-generators-repeatedly-2jd8
|
https://dev.to/billah_tishad/generate-generators-repeatedly-2jd8
| 0
| 6
| null |
2020-06-15T16:59:38Z
| null | null | 6
|
https://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fsource.unsplash.com%2FdaTYdZHaDWg%2F800x400
|
https://media2.dev.to/dynamic/image/width=1000,height=500,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fsource.unsplash.com%2FdaTYdZHaDWg%2F800x400
|
https://modasserbillah.ml/2020/06/15/generator/
|
2020-06-15T16:59:38Z
|
2020-06-15T17:04:34Z
| null |
2020-06-15T16:59:38Z
|
2020-06-15T16:59:38Z
| 2
|
['python', 'generators', 'hack']
|
python, generators, hack
|
{'name': 'Modasser Billah', 'username': 'billah_tishad', 'twitter_username': 'billah_tishad', 'github_username': None, 'user_id': 69153, 'website_url': 'http://modasserbillah.ml', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F69153%2F387e4fed-a0e3-476c-b7bc-8fa5b3af2330.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F69153%2F387e4fed-a0e3-476c-b7bc-8fa5b3af2330.jpg'}
| null | null | 570,451
|
article
| 353,094
|
TERMUX :A Linux Terminal on the Go
|
Have you ever wished to have a complete Linux environment with a terminal right on your Android...
|
Jun 11 '20
|
termux-4bep
|
/gatwirival/termux-4bep
|
https://dev.to/gatwirival/termux-4bep
| 0
| 7
| null |
2020-06-11T11:03:00Z
| null | null | 7
|
https://dev.to/gatwirival/termux-4bep
|
2020-06-11T11:03:00Z
|
2023-05-25T10:33:11Z
| null |
2020-06-11T11:03:00Z
|
2020-06-11T11:05:17Z
| 3
|
['android', 'hack']
|
android, hack
|
{'name': 'gatwirival', 'username': 'gatwirival', 'twitter_username': 'ValentineGatwi3', 'github_username': 'gatwirival', 'user_id': 364361, 'website_url': 'https://gatwirival.netlify.app/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F364361%2Fd641b4a8-6536-4e05-b414-d52c573649de.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F364361%2Fd641b4a8-6536-4e05-b414-d52c573649de.jpg'}
| null | null | 570,452
|
||
article
| 348,924
|
Pentesting Report: Attack Narrative Series Part 2: Threat Modeling
|
During my time at Flatiron School I created a password manager for my final project. Though a seeming...
|
Jun 4 '20
|
pentesting-report-attack-narrative-series-part-3-threat-modeling-44em
|
/caffiendkitten/pentesting-report-attack-narrative-series-part-3-threat-modeling-44em
|
https://dev.to/caffiendkitten/pentesting-report-attack-narrative-series-part-3-threat-modeling-44em
| 0
| 12
| 6,828
|
2020-06-04T01:49:06Z
| null | null | 12
| null |
https://dev.to/caffiendkitten/pentesting-report-attack-narrative-series-part-3-threat-modeling-44em
|
2020-06-04T01:42:20Z
|
2020-06-04T02:24:45Z
| null |
2020-06-04T01:49:06Z
|
2020-06-04T01:49:06Z
| 2
|
['security', 'pentesting', 'codenewbie', 'hack']
|
security, pentesting, codenewbie, hack
|
{'name': 'DaNeil C', 'username': 'caffiendkitten', 'twitter_username': None, 'github_username': 'caffiendkitten', 'user_id': 176046, 'website_url': 'https://caffiendkitten.github.io/#/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F176046%2Fda23df9e-2327-4d27-9900-81b8e3baa830.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F176046%2Fda23df9e-2327-4d27-9900-81b8e3baa830.png'}
| null | null | 570,453
|
|
article
| 340,557
|
Pentesting Report: Attack Narrative Series Part 1: Recon
|
During my time at Flatiron School I created a password manager for my final project. Though a seeming...
|
May 22 '20
|
pentesting-report-attack-narrative-series-part-1-recon-3ld5
|
/caffiendkitten/pentesting-report-attack-narrative-series-part-1-recon-3ld5
|
https://dev.to/caffiendkitten/pentesting-report-attack-narrative-series-part-1-recon-3ld5
| 0
| 15
| 6,828
|
2020-05-22T00:44:44Z
| null | null | 15
| null |
https://dev.to/caffiendkitten/pentesting-report-attack-narrative-series-part-1-recon-3ld5
|
2020-05-21T03:08:35Z
|
2020-06-04T23:47:55Z
| null |
2020-05-22T00:44:44Z
|
2020-05-22T00:44:44Z
| 4
|
['security', 'pentesting', 'codenewbie', 'hack']
|
security, pentesting, codenewbie, hack
|
{'name': 'DaNeil C', 'username': 'caffiendkitten', 'twitter_username': None, 'github_username': 'caffiendkitten', 'user_id': 176046, 'website_url': 'https://caffiendkitten.github.io/#/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F176046%2Fda23df9e-2327-4d27-9900-81b8e3baa830.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F176046%2Fda23df9e-2327-4d27-9900-81b8e3baa830.png'}
| null | null | 570,454
|
|
article
| 281,082
|
How to setup 2 separate Git profiles on a single device?
|
I work on a single device and use it for both my office work and side/pet/personal projects. Default...
|
Apr 9 '20
|
how-to-setup-2-separate-git-profiles-on-a-single-device-5b95
|
/sohammondal/how-to-setup-2-separate-git-profiles-on-a-single-device-5b95
|
https://dev.to/sohammondal/how-to-setup-2-separate-git-profiles-on-a-single-device-5b95
| 8
| 16
| null |
2020-04-09T16:27:26Z
| null | null | 16
| null |
https://dev.to/sohammondal/how-to-setup-2-separate-git-profiles-on-a-single-device-5b95
|
2020-03-14T06:53:36Z
|
2020-05-29T18:07:04Z
| null |
2020-04-09T16:27:26Z
|
2024-05-08T03:02:02Z
| 2
|
['git', 'github', 'bash', 'hack']
|
git, github, bash, hack
|
{'name': 'Soham Mondal', 'username': 'sohammondal', 'twitter_username': 'sohammondal_', 'github_username': 'sohammondal', 'user_id': 214163, 'website_url': 'https://sohammondal.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F214163%2F70f3a675-a9a0-46d2-86ad-78fe7758ca89.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F214163%2F70f3a675-a9a0-46d2-86ad-78fe7758ca89.jpeg'}
| null | null | 570,455
|
|
article
| 288,362
|
Docker で Hack
|
Facebook Hack試してみた。(Hello...
|
Mar 26 '20
|
docker-hack-2bde
|
/dongri/docker-hack-2bde
|
https://dev.to/dongri/docker-hack-2bde
| 1
| 5
| null |
2020-03-26T02:11:39Z
| null | null | 5
| null |
https://dev.to/dongri/docker-hack-2bde
|
2020-03-26T02:10:59Z
| null | null |
2020-03-26T02:11:39Z
|
2021-09-20T16:02:56Z
| 1
|
['docker', 'hack']
|
docker, hack
|
{'name': 'D', 'username': 'dongri', 'twitter_username': 'dongrify', 'github_username': None, 'user_id': 41986, 'website_url': 'https://dongri.eth.link', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F41986%2Ffcc19bb5-d944-4497-ad93-3785539b1875.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F41986%2Ffcc19bb5-d944-4497-ad93-3785539b1875.png'}
| null | null | 570,456
|
|
article
| 252,751
|
Remove crapware unused magento 2 extensions
|
Yeah magento should focus in main core modules good for business and avoid bundle crap things From m...
|
Feb 1 '20
|
remove-crapware-unused-magento-2-extensions-4ke6
|
/mrtuvn/remove-crapware-unused-magento-2-extensions-4ke6
|
https://dev.to/mrtuvn/remove-crapware-unused-magento-2-extensions-4ke6
| 1
| 6
| null |
2020-02-01T03:20:10Z
| null | null | 6
| null |
https://dev.to/mrtuvn/remove-crapware-unused-magento-2-extensions-4ke6
|
2020-02-01T03:20:10Z
|
2020-02-01T03:55:34Z
| null |
2020-02-01T03:20:10Z
|
2024-07-24T18:50:50Z
| 1
|
['magento2', 'webdev', 'hack']
|
magento2, webdev, hack
|
{'name': 'Tu Nguyen', 'username': 'mrtuvn', 'twitter_username': None, 'github_username': 'mrtuvn', 'user_id': 326239, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F326239%2Fad555e27-5f16-4083-8152-ab8e0b5f34e7.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F326239%2Fad555e27-5f16-4083-8152-ab8e0b5f34e7.jpeg'}
| null | null | 570,457
|
|
article
| 239,957
|
a nasty git alias hack
|
a nasty git bash alias hack DO NOT DO THIS IN THE REAL WORLD create a file ~/.bash_aliases $ cat...
|
Jan 17 '20
|
a-nasty-git-alias-hack-3chg
|
/osde8info/a-nasty-git-alias-hack-3chg
|
https://dev.to/osde8info/a-nasty-git-alias-hack-3chg
| 12
| 4
| null |
2020-01-17T09:42:50Z
| null | null | 4
| null |
https://dev.to/osde8info/a-nasty-git-alias-hack-3chg
|
2020-01-17T09:42:50Z
| null | null |
2020-01-17T09:42:50Z
|
2022-01-23T20:11:55Z
| 1
|
['git', 'github', 'hack', 'bash']
|
git, github, hack, bash
|
{'name': 'Clive Da', 'username': 'osde8info', 'twitter_username': 'osde8info', 'github_username': 'osde8info', 'user_id': 313628, 'website_url': 'http://osde.info', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F313628%2F5847f03f-7b7e-44a2-a04f-316577341517.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F313628%2F5847f03f-7b7e-44a2-a04f-316577341517.jpeg'}
| null | null | 570,458
|
|
article
| 225,239
|
Flying a DJI Tello Drone with Go
|
The Idea A few months ago, I bought a DJI Tello (affiliate link) drone on Amazon for ~ 80...
|
Dec 22 '19
|
flying-a-dji-tello-drone-with-go-3oll
|
/n1try/flying-a-dji-tello-drone-with-go-3oll
|
https://dev.to/n1try/flying-a-dji-tello-drone-with-go-3oll
| 0
| 8
| null |
2019-12-22T08:12:09Z
| null | null | 8
| null |
https://dev.to/n1try/flying-a-dji-tello-drone-with-go-3oll
|
2019-12-22T08:12:09Z
|
2019-12-22T08:12:32Z
| null |
2019-12-22T08:12:09Z
|
2019-12-22T08:12:09Z
| 4
|
['robot', 'hack', 'drone', 'go']
|
robot, hack, drone, go
|
{'name': 'Ferdinand Mütsch', 'username': 'n1try', 'twitter_username': 'n2try', 'github_username': 'muety', 'user_id': 1178, 'website_url': 'https://muetsch.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1178%2Fff5aeaea-10eb-427d-b624-f50d55437e43.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1178%2Fff5aeaea-10eb-427d-b624-f50d55437e43.png'}
| null | null | 570,459
|
|
article
| 196,108
|
Is Blockchain Wallet Safe
|
Hi, am new here.. I don't code as much I focus on crypto education and awareness here in East Africa....
|
Oct 27 '19
|
is-blockchain-wallet-safe-j41
|
/kaptichlouis/is-blockchain-wallet-safe-j41
|
https://dev.to/kaptichlouis/is-blockchain-wallet-safe-j41
| 2
| 3
| null |
2019-10-27T08:56:24Z
| null | null | 3
| null |
https://dev.to/kaptichlouis/is-blockchain-wallet-safe-j41
|
2019-10-27T08:56:25Z
| null | null |
2019-10-27T08:56:24Z
|
2024-01-20T20:13:00Z
| 1
|
['blockchainwallet', 'hack', 'security', 'blockchain']
|
blockchainwallet, hack, security, blockchain
|
{'name': 'Kaptich', 'username': 'kaptichlouis', 'twitter_username': 'KaptichLouis', 'github_username': None, 'user_id': 258955, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F258955%2F64caf32c-875b-4b3c-a9fe-fdc5415aa040.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F258955%2F64caf32c-875b-4b3c-a9fe-fdc5415aa040.jpg'}
| null | null | 570,460
|
|
article
| 98,777
|
DailyHack: A place of Tricks and Hacks
|
A Community of Makers and Geeks
|
Jun 14 '19
|
dailyhack-a-place-of-tricks-and-hacks-2k2l
|
/mddanishyusuf/dailyhack-a-place-of-tricks-and-hacks-2k2l
|
https://dev.to/mddanishyusuf/dailyhack-a-place-of-tricks-and-hacks-2k2l
| 2
| 6
| null |
2019-06-14T05:24:06Z
| null | null | 6
| null |
https://dev.to/mddanishyusuf/dailyhack-a-place-of-tricks-and-hacks-2k2l
|
2019-04-10T10:18:55Z
| null | null |
2019-06-14T05:24:06Z
|
2019-06-14T05:46:18Z
| 1
|
['tricks', 'community', 'daily', 'hack']
|
tricks, community, daily, hack
|
{'name': 'Mohd Danish', 'username': 'mddanishyusuf', 'twitter_username': 'mddanishyusuf', 'github_username': 'mddanishyusuf', 'user_id': 145496, 'website_url': 'https://mohddanish.me', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F145496%2F44ca14db-847a-4f86-94de-ed240c1bccdd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F145496%2F44ca14db-847a-4f86-94de-ed240c1bccdd.png'}
| null | null | 570,462
|
|
article
| 60,688
|
Generate QR Code in Python to transfer files from laptop to mobile
|
Python program to transfer files from laptop to mobile
|
Nov 6 '18
|
use-qr-code-to-transfer-files-from-laptop-to-mobile-28l7
|
/sahilrajput/use-qr-code-to-transfer-files-from-laptop-to-mobile-28l7
|
https://dev.to/sahilrajput/use-qr-code-to-transfer-files-from-laptop-to-mobile-28l7
| 2
| 28
| null |
2018-11-06T18:24:16Z
| null | null | 28
| null |
https://dev.to/sahilrajput/use-qr-code-to-transfer-files-from-laptop-to-mobile-28l7
|
2018-11-06T18:24:16Z
|
2018-12-04T09:22:46Z
| null |
2018-11-06T18:24:16Z
|
2020-03-31T14:13:17Z
| 2
|
['python', 'program', 'hack']
|
python, program, hack
|
{'name': 'Sahil Rajput', 'username': 'sahilrajput', 'twitter_username': '_sahilrajput', 'github_username': 'sahil-rajput', 'user_id': 111589, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F111589%2F0f2a16b8-87a7-4161-8d68-29c61144bb0d.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F111589%2F0f2a16b8-87a7-4161-8d68-29c61144bb0d.jpeg'}
| null | null | 570,463
|
|
article
| 58,529
|
Handling ActiveStorage direct uploads and server side form validations
|
Ok, so this is slightly hacky. Let me also preface this by saying there's probably no real need to do...
|
Oct 31 '18
|
handling-activestorage-direct-uploads-and-server-side-form-validations-opk
|
/drbragg/handling-activestorage-direct-uploads-and-server-side-form-validations-opk
|
https://dev.to/drbragg/handling-activestorage-direct-uploads-and-server-side-form-validations-opk
| 8
| 13
| null |
2018-10-31T14:57:44Z
| null | null | 13
|
https://dev.to/drbragg/handling-activestorage-direct-uploads-and-server-side-form-validations-opk
|
2018-10-31T14:57:44Z
|
2018-10-31T15:04:48Z
| null |
2018-10-31T14:57:44Z
|
2023-05-11T14:07:02Z
| 3
|
['rails', 'activestorage', 'hack']
|
rails, activestorage, hack
|
{'name': 'Drew Bragg', 'username': 'drbragg', 'twitter_username': 'DRBragg', 'github_username': 'DRBragg', 'user_id': 57091, 'website_url': 'https://www.drbragg.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F57091%2F697943b3-9714-4323-8e3f-1ec86fc24429.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F57091%2F697943b3-9714-4323-8e3f-1ec86fc24429.jpeg'}
| null | null | 570,464
|
||
article
| 56,057
|
Mounted and BeforeDestroy Hooks in Vue.js functional components.
|
A little hack how to implement mounted and beforeDestroy hooks in Vue.js functional components
|
Oct 21 '18
|
mounted-and-beforedestroy-hooks-in-vuejs-functional-components-7bi
|
/denisinvader/mounted-and-beforedestroy-hooks-in-vuejs-functional-components-7bi
|
https://dev.to/denisinvader/mounted-and-beforedestroy-hooks-in-vuejs-functional-components-7bi
| 0
| 23
| null |
2018-10-21T09:39:47Z
| null | null | 23
|
https://dev.to/denisinvader/mounted-and-beforedestroy-hooks-in-vuejs-functional-components-7bi
|
2018-10-21T09:39:13Z
|
2018-10-21T09:39:55Z
| null |
2018-10-21T09:39:47Z
|
2018-10-21T09:39:47Z
| 2
|
['javascript', 'vue', 'hack']
|
javascript, vue, hack
|
{'name': 'Mikhail Panichev', 'username': 'denisinvader', 'twitter_username': None, 'github_username': 'denisinvader', 'user_id': 77779, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F77779%2F7ddc7365-8488-4dd2-bd65-60bc4541ed8a.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F77779%2F7ddc7365-8488-4dd2-bd65-60bc4541ed8a.jpeg'}
| null | null | 570,465
|
||
article
| 38,846
|
Rails: increment counter cache and return value
|
Small ActiveRecord hack that you can use everyday.
|
Jul 11 '18
|
rails-increment-counter-cache-and-return-value-1pg4
|
/jetrockets/rails-increment-counter-cache-and-return-value-1pg4
|
https://dev.to/jetrockets/rails-increment-counter-cache-and-return-value-1pg4
| 4
| 23
| null |
2018-07-11T20:46:53Z
| null | null | 23
| null |
https://dev.to/jetrockets/rails-increment-counter-cache-and-return-value-1pg4
|
2018-07-11T20:46:53Z
| null | null |
2018-07-11T20:46:53Z
|
2024-06-10T03:02:51Z
| 1
|
['rails', 'hack', 'activerecord', 'ruby']
|
rails, hack, activerecord, ruby
|
{'name': 'Igor Alexandrov', 'username': 'igor_alexandrov', 'twitter_username': 'igor_alexandrov', 'github_username': 'igor-alexandrov', 'user_id': 74083, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F74083%2F8a192ed4-11a9-4803-a7cd-e6ede5c90431.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F74083%2F8a192ed4-11a9-4803-a7cd-e6ede5c90431.jpeg'}
|
{'name': 'JetRockets', 'username': 'jetrockets', 'slug': 'jetrockets', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F221%2Fef590743-0c39-475d-9d91-d5328ff9d3db.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F221%2Fef590743-0c39-475d-9d91-d5328ff9d3db.png'}
| null | 570,466
|
|
article
| 34,441
|
Angular: Structural directives like *ngIf and *ngFor without the extra elements
|
One drawback I've found with Angular is that you often found yourself adding unnecessary DOM elements...
|
Jun 8 '18
|
angular-structural-directives-like-ngif-and-ngfor-without-the-extra-elements-5c24
|
/wiaio/angular-structural-directives-like-ngif-and-ngfor-without-the-extra-elements-5c24
|
https://dev.to/wiaio/angular-structural-directives-like-ngif-and-ngfor-without-the-extra-elements-5c24
| 2
| 34
| null |
2018-06-08T09:57:31Z
| null | null | 34
| null |
https://dev.to/wiaio/angular-structural-directives-like-ngif-and-ngfor-without-the-extra-elements-5c24
|
2018-06-08T09:57:31Z
|
2018-06-08T10:04:19Z
| null |
2018-06-08T09:57:31Z
|
2019-10-29T01:05:56Z
| 1
|
['angular', 'beginners', 'easy', 'hack']
|
angular, beginners, easy, hack
|
{'name': 'Austin Spivey', 'username': 'anspivey', 'twitter_username': 'ANSPIVEY', 'github_username': None, 'user_id': 49562, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F49562%2F1b225489-35d3-4324-a888-a4b11a57be81.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F49562%2F1b225489-35d3-4324-a888-a4b11a57be81.jpg'}
|
{'name': 'Wia', 'username': 'wiaio', 'slug': 'wiaio', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F236%2F09527266-6077-4d72-9d84-0f81d2493898.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F236%2F09527266-6077-4d72-9d84-0f81d2493898.png'}
| null | 570,467
|
|
article
| 128,354
|
Installing gdal for Python 3.6
|
Heyo, At Skyai, we are working a lot with Geographic Information Systems. Just like the large...
|
Jun 29 '19
|
installing-gdal-for-python-3-6-3iff
|
/jlengrand/installing-gdal-for-python-3-6-3iff
|
https://dev.to/jlengrand/installing-gdal-for-python-3-6-3iff
| 2
| 5
| null |
2019-06-29T08:10:06Z
| null | null | 5
| null |
https://lengrand.fr/installing-gdal-python36/
|
2019-06-25T13:02:47Z
| null |
2019-06-29T08:10:06Z
|
2018-06-01T00:00:00Z
|
2019-09-26T14:49:53Z
| 5
|
['development', 'bash', 'python', 'hack']
|
development, bash, python, hack
|
{'name': 'Julien Lengrand-Lambert', 'username': 'jlengrand', 'twitter_username': 'jlengrand', 'github_username': 'jlengrand', 'user_id': 95838, 'website_url': 'https://lengrand.fr/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F95838%2F00680dfa-f143-4836-aa4f-77ec8185866b.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F95838%2F00680dfa-f143-4836-aa4f-77ec8185866b.jpeg'}
| null | null | 570,468
|
|
article
| 128,352
|
Automating the activation / deactivation of Spotify's proxy settings
|
I'm a BIG fan of Spotify. I use it every day, hours on end. I like the fat client though, I find...
|
Jun 29 '19
|
automating-the-activation-deactivation-of-spotify-s-proxy-settings-2bp
|
/jlengrand/automating-the-activation-deactivation-of-spotify-s-proxy-settings-2bp
|
https://dev.to/jlengrand/automating-the-activation-deactivation-of-spotify-s-proxy-settings-2bp
| 0
| 6
| null |
2019-06-29T15:57:21Z
| null | null | 6
| null |
https://lengrand.fr/automating-spotify-proxy-settings/
|
2019-06-25T13:02:45Z
| null |
2019-06-29T15:57:21Z
|
2018-04-23T00:00:00Z
|
2018-04-23T00:00:00Z
| 2
|
['hack', 'spotify', 'bash']
|
hack, spotify, bash
|
{'name': 'Julien Lengrand-Lambert', 'username': 'jlengrand', 'twitter_username': 'jlengrand', 'github_username': 'jlengrand', 'user_id': 95838, 'website_url': 'https://lengrand.fr/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F95838%2F00680dfa-f143-4836-aa4f-77ec8185866b.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F95838%2F00680dfa-f143-4836-aa4f-77ec8185866b.jpeg'}
| null | null | 570,469
|
|
article
| 11,674
|
Rubber Ducky
|
what is a rubber Ducky and how to use it.
|
Nov 7 '17
|
rubber-ducky-293
|
/terceranexus6/rubber-ducky-293
|
https://dev.to/terceranexus6/rubber-ducky-293
| 3
| 35
| null |
2017-11-07T16:05:32Z
| null | null | 35
| null |
https://dev.to/terceranexus6/rubber-ducky-293
|
2017-11-07T16:05:32Z
| null | null |
2017-11-07T16:05:32Z
|
2018-03-05T04:47:12Z
| 2
|
['security', 'hack', 'duck']
|
security, hack, duck
|
{'name': 'Paula', 'username': 'terceranexus6', 'twitter_username': None, 'github_username': 'terceranexus6', 'user_id': 14900, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F14900%2F6229dd06-6ea5-4028-b20f-89fb581dc3fd.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F14900%2F6229dd06-6ea5-4028-b20f-89fb581dc3fd.jpg'}
| null | null | 570,470
|
|
article
| 9,465
|
Clarifai Featured Hack: Recyclodroid is a recycling robot made of recycled materials
|
The Recyclodroid is an advanced robotic device that uses image recognition as i...
|
Oct 27 '17
|
clarifai-featured-hack-recyclodroid-is-a-recycling-robot-made-of-recycled-materials-1mk
|
/clarifai/clarifai-featured-hack-recyclodroid-is-a-recycling-robot-made-of-recycled-materials-1mk
|
https://dev.to/clarifai/clarifai-featured-hack-recyclodroid-is-a-recycling-robot-made-of-recycled-materials-1mk
| 0
| 9
| null |
2017-10-27T00:07:44Z
| null | null | 9
| null |
https://dev.to/clarifai/clarifai-featured-hack-recyclodroid-is-a-recycling-robot-made-of-recycled-materials-1mk
|
2017-10-08T19:03:58Z
| null |
2017-10-27T00:07:44Z
|
2017-10-05T18:52:43Z
|
2018-03-13T19:55:59Z
| 3
|
['visualrecognition', 'ai', 'hack', 'api']
|
visualrecognition, ai, hack, api
|
{'name': 'Clarifai Team', 'username': 'clarifai_team', 'twitter_username': 'clarifai', 'github_username': None, 'user_id': 30056, 'website_url': 'https://clarifai.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F30056%2F9a89bdf0-ec72-4378-b4b4-c9957046a160.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F30056%2F9a89bdf0-ec72-4378-b4b4-c9957046a160.png'}
|
{'name': 'Clarifai', 'username': 'clarifai', 'slug': 'clarifai', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F16%2F0ca7cf91-1b02-49a3-95b8-996e79091eae.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F16%2F0ca7cf91-1b02-49a3-95b8-996e79091eae.png'}
| null | 570,471
|
|
article
| 415,286
|
Introducing Jiofi-CLI. A CLI interface for getting your Jiofi Device Info.
|
JioFi is a portable wifi hotspot for personal use by Jio. They have somewhat generous plans and are a...
|
Aug 1 '20
|
introducing-jiofi-cli-a-cli-interface-for-getting-your-jiofi-device-info-4gd7
|
/athulcajay/introducing-jiofi-cli-a-cli-interface-for-getting-your-jiofi-device-info-4gd7
|
https://dev.to/athulcajay/introducing-jiofi-cli-a-cli-interface-for-getting-your-jiofi-device-info-4gd7
| 0
| 12
| null |
2020-08-01T07:22:34Z
|
en
| null | 12
| null |
https://blog.athulcyriac.co/jiofi/
|
2020-08-01T07:22:34Z
|
2020-08-01T07:23:33Z
| null |
2020-08-01T07:22:34Z
|
2020-08-01T07:22:34Z
| 4
|
['showdev', 'python', 'hack']
|
showdev, python, hack
|
{'name': 'Athul Cyriac ', 'username': 'athulcajay', 'twitter_username': 'athulcajay', 'github_username': 'athul', 'user_id': 157065, 'website_url': 'https://athulcyriac.xyz', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F157065%2F004601c9-e12b-4b9b-828a-48ed31cc6b7d.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F157065%2F004601c9-e12b-4b9b-828a-48ed31cc6b7d.png'}
| null |
{'name': 'showdev', 'bg_color_hex': '#091b47', 'text_color_hex': '#b2ffe1'}
| 570,472
|
|
article
| 239,876
|
This is why I love Git (and Vim)! (also, is there a better solution?)
|
Today I was pushing new commits to the remote pull-request branch which already had 5 commits. Then w...
|
Jan 17 '20
|
this-is-why-i-love-git-and-vim-also-is-there-a-better-solution-3h35
|
/nirlanka/this-is-why-i-love-git-and-vim-also-is-there-a-better-solution-3h35
|
https://dev.to/nirlanka/this-is-why-i-love-git-and-vim-also-is-there-a-better-solution-3h35
| 0
| 8
| null |
2020-01-17T07:00:49Z
| null | null | 8
| null |
https://dev.to/nirlanka/this-is-why-i-love-git-and-vim-also-is-there-a-better-solution-3h35
|
2020-01-17T06:41:24Z
|
2020-01-18T11:50:59Z
| null |
2020-01-17T07:00:49Z
|
2020-01-17T07:00:49Z
| 4
|
['git', 'hack', 'quicknote', 'storytime']
|
git, hack, quicknote, storytime
|
{'name': 'Nir Lanka ニル', 'username': 'nirlanka', 'twitter_username': None, 'github_username': 'nirlanka', 'user_id': 40281, 'website_url': 'https://nirlanka.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F40281%2Ff9b25b19-1b40-477a-bc16-dbc361ef73ee.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F40281%2Ff9b25b19-1b40-477a-bc16-dbc361ef73ee.jpeg'}
| null | null | 570,473
|
|
article
| 182,238
|
JS Hack: Array & Duplicate Values
|
Simple and useful Array features in Javascript that are little known among developers.
|
Oct 8 '19
|
js-hack-array-duplicate-values-2l58
|
/dashbird/js-hack-array-duplicate-values-2l58
|
https://dev.to/dashbird/js-hack-array-duplicate-values-2l58
| 2
| 7
| null |
2019-10-08T13:51:11Z
| null | null | 7
|
https://dev.to/dashbird/js-hack-array-duplicate-values-2l58
|
2019-10-03T20:02:44Z
| null | null |
2019-10-08T13:51:11Z
|
2019-10-17T16:14:04Z
| 1
|
['javascript', 'baredev', 'hack', 'watercooler']
|
javascript, baredev, hack, watercooler
|
{'name': 'Renato Byrro', 'username': 'byrro', 'twitter_username': 'ByrroRenato', 'github_username': 'byrro', 'user_id': 135778, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F135778%2F9545e7d7-5bd6-4fbe-8345-54903d8760e3.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F135778%2F9545e7d7-5bd6-4fbe-8345-54903d8760e3.png'}
|
{'name': 'Dashbird', 'username': 'dashbird', 'slug': 'dashbird', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F1209%2F234b9342-3bb8-41e9-acf3-2ed557ee5391.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F1209%2F234b9342-3bb8-41e9-acf3-2ed557ee5391.png'}
|
{'name': 'watercooler', 'bg_color_hex': '#D0ECFF', 'text_color_hex': '#130074'}
| 570,474
|
||
article
| 170,428
|
Hack Rails with vulnerabilities by OWASP
|
rails app for testing your hacking skills
|
Sep 14 '19
|
hack-rails-app-13i4
|
/dukaev/hack-rails-app-13i4
|
https://dev.to/dukaev/hack-rails-app-13i4
| 0
| 5
| null |
2019-09-14T20:57:05Z
| null | null | 5
| null |
https://dev.to/dukaev/hack-rails-app-13i4
|
2019-09-14T20:56:11Z
|
2019-09-14T21:30:51Z
| null |
2019-09-14T20:57:05Z
|
2019-09-14T20:57:05Z
| 1
|
['ruby', 'rails', 'hack', 'security']
|
ruby, rails, hack, security
|
{'name': 'Aslan Dukaev', 'username': 'dukaev', 'twitter_username': None, 'github_username': 'dukaev', 'user_id': 70682, 'website_url': 'https://github.com/dukaev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F70682%2Fcd52d676-b005-4ca3-8d1c-edafd150d284.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F70682%2Fcd52d676-b005-4ca3-8d1c-edafd150d284.jpg'}
| null | null | 570,475
|
|
article
| 1,243,068
|
Pi Power -- How I Made a Battery Powered USB Hub
|
As I prepare to start adding peripherals to my Pi Bot, I wanted to be sure to get around the...
|
Apr 20 '13
|
pi-power-how-i-made-a-battery-powered-usb-hub-5e1p
|
/ladvien/pi-power-how-i-made-a-battery-powered-usb-hub-5e1p
|
https://dev.to/ladvien/pi-power-how-i-made-a-battery-powered-usb-hub-5e1p
| 0
| 0
| 20,411
|
2013-04-20T10:00:00Z
| null | null | 0
|
https://ladvien.com/pi-power
|
2022-11-04T10:35:05Z
| null | null |
2013-04-20T10:00:00Z
|
2013-04-20T10:00:00Z
| 2
|
['robots', 'hack']
|
robots, hack
|
{'name': 'Thomas Brittain', 'username': 'ladvien', 'twitter_username': None, 'github_username': 'Ladvien', 'user_id': 964957, 'website_url': 'https://ladvien.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F964957%2F611c9ed5-aa94-4923-bef1-d8d59fc28986.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F964957%2F611c9ed5-aa94-4923-bef1-d8d59fc28986.png'}
| null | null | 570,476
|
||
article
| 180,222
|
How Can i get Ruby in mario kart tour
|
Mario Kart tour has raced onto the App keep, and it is an example of what not to do while changing a...
|
Sep 29 '19
|
how-can-i-get-ruby-in-mario-kart-tour-59id
|
/bartolomedipatuanregis88/how-can-i-get-ruby-in-mario-kart-tour-59id
|
https://dev.to/bartolomedipatuanregis88/how-can-i-get-ruby-in-mario-kart-tour-59id
| 1
| 6
| 2,477
|
2019-09-29T22:59:18Z
| null | null | 6
| null |
https://hackmod.vip/mario-kart-tour-mod-rubies-hack/
|
2019-09-29T22:58:39Z
|
2019-09-29T23:00:06Z
| null |
2019-09-29T22:59:18Z
|
2020-03-31T14:13:16Z
| 4
|
['mariokarttour', 'hack', 'mod', 'ruby']
|
mariokarttour, hack, mod, ruby
|
{'name': 'BartolomeDipatuanregis88', 'username': 'bartolomedipatuanregis88', 'twitter_username': None, 'github_username': 'BartolomeDipatuanregis88', 'user_id': 238951, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F238951%2F4bd69355-756f-4d17-ae81-0a56b0e01c08.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F238951%2F4bd69355-756f-4d17-ae81-0a56b0e01c08.png'}
| null | null | 570,477
|
|
article
| 2,251,545
|
ISMS Policies: What They Are and How They Can Prevent Cyber Attacks
|
In this digital era, computer security is a matter of great concern for organizations, regardless of...
|
Feb 4
|
isms-policies-what-they-are-and-how-they-can-prevent-cyber-attacks-54i
|
/anupriya/isms-policies-what-they-are-and-how-they-can-prevent-cyber-attacks-54i
|
https://dev.to/anupriya/isms-policies-what-they-are-and-how-they-can-prevent-cyber-attacks-54i
| 0
| 0
| null |
2025-02-04T11:27:30Z
|
en
| 1
| 0
|
https://dev.to/anupriya/isms-policies-what-they-are-and-how-they-can-prevent-cyber-attacks-54i
|
2025-01-31T07:13:19Z
| null | null |
2025-02-04T11:27:30Z
|
2025-02-04T11:27:30Z
| 4
|
['ismspolicies', 'cyberattack', 'dataprotection', 'compliance']
|
ismspolicies, cyberattack, dataprotection, compliance
|
{'name': 'Anupriya', 'username': 'anupriya', 'twitter_username': None, 'github_username': None, 'user_id': 2056205, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2056205%2Fb3c2ffc0-70b9-48b5-8fb9-feb001360b72.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2056205%2Fb3c2ffc0-70b9-48b5-8fb9-feb001360b72.png'}
| null | null | 570,784
|
||
article
| 2,238,220
|
Things to Know About GxP Compliance
|
Quality and safety are essential in today’s world, particularly, industries like healthcare, pharma,...
|
Jan 24
|
things-to-know-about-gxp-compliance-5g92
|
/rohitbhandari102/things-to-know-about-gxp-compliance-5g92
|
https://dev.to/rohitbhandari102/things-to-know-about-gxp-compliance-5g92
| 0
| 0
| null |
2025-01-24T11:08:32Z
|
en
| 1
| 0
| null |
https://d-addicts.com/things-to-know-about-gxp-compliance/
|
2025-01-24T11:08:33Z
| null | null |
2025-01-24T11:08:32Z
|
2025-01-24T11:08:32Z
| 3
|
['gxp', 'compliance']
|
gxp, compliance
|
{'name': 'Rohit Bhandari', 'username': 'rohitbhandari102', 'twitter_username': 'opkeyseo', 'github_username': None, 'user_id': 967586, 'website_url': 'https://www.opkey.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F967586%2Fdfbb7259-1a88-4543-bb2a-4eeb8274c4f7.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F967586%2Fdfbb7259-1a88-4543-bb2a-4eeb8274c4f7.png'}
| null | null | 570,785
|
|
article
| 2,217,789
|
How is AI Used in Fraud Detection?
|
Fraud is a persistent threat across industries, costing businesses and individuals billions of...
|
Jan 17
|
how-is-ai-used-in-fraud-detection-27fa
|
/lokeshjoshi/how-is-ai-used-in-fraud-detection-27fa
|
https://dev.to/lokeshjoshi/how-is-ai-used-in-fraud-detection-27fa
| 0
| 1
| null |
2025-01-17T08:50:42Z
|
en
| 1
| 1
|
https://dev.to/lokeshjoshi/how-is-ai-used-in-fraud-detection-27fa
|
2025-01-17T08:50:43Z
| null | null |
2025-01-17T08:50:42Z
|
2025-01-17T08:50:42Z
| 3
|
['ai', 'fraud', 'machinelearning', 'compliance']
|
ai, fraud, machinelearning, compliance
|
{'name': 'Lokesh Joshi', 'username': 'lokeshjoshi', 'twitter_username': 'lokeshjoshi94', 'github_username': 'lokeshjoshi93', 'user_id': 395456, 'website_url': 'https://www.kychub.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F395456%2Faceb02e0-5322-482b-9ddf-b67513d64569.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F395456%2Faceb02e0-5322-482b-9ddf-b67513d64569.jpg'}
| null | null | 570,786
|
||
article
| 2,203,176
|
5 Key Benefits of GxP Compliance
|
Upholding quality as well as safety standards is critical in today’s highly regulated industries,...
|
Jan 13
|
5-key-benefits-of-gxp-compliance-5bfl
|
/rohitbhandari102/5-key-benefits-of-gxp-compliance-5bfl
|
https://dev.to/rohitbhandari102/5-key-benefits-of-gxp-compliance-5bfl
| 0
| 0
| null |
2025-01-13T06:53:22Z
|
en
| 1
| 0
| null |
https://techktimes.co.uk/5-key-benefits-of-gxp-compliance/
|
2025-01-13T06:53:23Z
| null | null |
2025-01-13T06:53:22Z
|
2025-01-13T06:53:22Z
| 3
|
['gxp', 'compliance']
|
gxp, compliance
|
{'name': 'Rohit Bhandari', 'username': 'rohitbhandari102', 'twitter_username': 'opkeyseo', 'github_username': None, 'user_id': 967586, 'website_url': 'https://www.opkey.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F967586%2Fdfbb7259-1a88-4543-bb2a-4eeb8274c4f7.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F967586%2Fdfbb7259-1a88-4543-bb2a-4eeb8274c4f7.png'}
| null | null | 570,787
|
|
article
| 2,236,754
|
AI is our New Drugs Epidemic!💊
|
The similarities between artificial intelligence and drugs aren't what most people expect, let alone...
|
Jan 23
|
ai-is-our-new-drugs-2olh
|
/bartohm/ai-is-our-new-drugs-2olh
|
https://dev.to/bartohm/ai-is-our-new-drugs-2olh
| 0
| 0
| null |
2025-01-23T19:13:05Z
|
en
| 1
| 0
|
https://dev.to/bartohm/ai-is-our-new-drugs-2olh
|
2025-01-23T19:13:06Z
|
2025-02-21T14:40:28Z
| null |
2025-01-23T19:13:05Z
|
2025-01-23T19:13:05Z
| 3
|
['ai', 'regulation', 'compliance', 'drugs']
|
ai, regulation, compliance, drugs
|
{'name': 'Bartolomeo Hart', 'username': 'bartohm', 'twitter_username': 'bart_ohm', 'github_username': None, 'user_id': 2524655, 'website_url': 'https://wishlist.sh', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2524655%2F1bf82b31-7afb-47a0-b2ae-a090370228c6.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2524655%2F1bf82b31-7afb-47a0-b2ae-a090370228c6.png'}
| null | null | 570,788
|
||
article
| 2,150,999
|
Supplier and Contractor Management for GxP Compliance
|
The operations of pharmaceutical, biotechnology and medical device industries are conducted in a...
|
Dec 11 '24
|
supplier-and-contractor-management-for-gxp-compliance-3n59
|
/rohitbhandari102/supplier-and-contractor-management-for-gxp-compliance-3n59
|
https://dev.to/rohitbhandari102/supplier-and-contractor-management-for-gxp-compliance-3n59
| 0
| 1
| null |
2024-12-11T06:20:09Z
|
en
| null | 1
| null |
https://www.exhibit.tech/how-tos/supplier-and-contractor-management-for-gxp-compliance
|
2024-12-11T06:20:10Z
| null | null |
2024-12-11T06:20:09Z
|
2024-12-11T06:20:09Z
| 2
|
['gxp', 'compliance']
|
gxp, compliance
|
{'name': 'Rohit Bhandari', 'username': 'rohitbhandari102', 'twitter_username': 'opkeyseo', 'github_username': None, 'user_id': 967586, 'website_url': 'https://www.opkey.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F967586%2Fdfbb7259-1a88-4543-bb2a-4eeb8274c4f7.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F967586%2Fdfbb7259-1a88-4543-bb2a-4eeb8274c4f7.png'}
| null | null | 570,789
|
|
article
| 2,125,561
|
Compliance as Code: A Strategic Approach to Secure and Efficient Software Development
|
Compliance as code approach integrates automated security checks and compliance validations directly...
|
Nov 28 '24
|
compliance-as-code-a-strategic-approach-to-secure-and-efficient-software-development-47gm
|
/aragorn_talks/compliance-as-code-a-strategic-approach-to-secure-and-efficient-software-development-47gm
|
https://dev.to/aragorn_talks/compliance-as-code-a-strategic-approach-to-secure-and-efficient-software-development-47gm
| 0
| 0
| null |
2024-11-28T14:17:01Z
|
en
| null | 0
| null |
https://dev.to/aragorn_talks/compliance-as-code-a-strategic-approach-to-secure-and-efficient-software-development-47gm
|
2024-11-28T14:17:02Z
| null | null |
2024-11-28T14:17:01Z
|
2024-11-28T14:17:01Z
| 4
|
['compliance']
|
compliance
|
{'name': 'Aragorn', 'username': 'aragorn_talks', 'twitter_username': None, 'github_username': None, 'user_id': 2436721, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2436721%2F2cd30cea-51c2-4353-a561-ffad92a81f54.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2436721%2F2cd30cea-51c2-4353-a561-ffad92a81f54.jpg'}
| null | null | 570,790
|
|
article
| 2,153,438
|
Importance of Compliance (GDPR, HIPAA)
|
Compliance with frameworks like GDPR (General Data Protection Regulation) and HIPAA (Health Insurance...
|
Dec 12 '24
|
importance-of-compliance-gdpr-hipaa-1m0c
|
/574n13y/importance-of-compliance-gdpr-hipaa-1m0c
|
https://dev.to/574n13y/importance-of-compliance-gdpr-hipaa-1m0c
| 2
| 2
| null |
2024-12-12T13:14:08Z
|
en
| null | 2
| null |
https://dev.to/574n13y/importance-of-compliance-gdpr-hipaa-1m0c
|
2024-12-12T13:14:08Z
| null | null |
2024-12-12T13:14:08Z
|
2025-01-10T11:42:32Z
| 3
|
['cloud', 'devops', 'security', 'compliance']
|
cloud, devops, security, compliance
|
{'name': 'Vivesh ', 'username': '574n13y', 'twitter_username': None, 'github_username': None, 'user_id': 2167787, 'website_url': 'https://vivesh.vercel.app/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2167787%2F2f1f465c-947f-45c9-9d1c-3ba83eeae4da.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2167787%2F2f1f465c-947f-45c9-9d1c-3ba83eeae4da.jpg'}
| null | null | 570,791
|
|
article
| 2,147,502
|
Stay Safe from $1.2 Million CPRA Fines
|
In the ever-evolving world of data privacy, companies thought they were secure — until they faced...
|
Dec 9 '24
|
stay-safe-from-12-million-cpra-fines-4gl9
|
/mehwish_malik_4f29ff7fb04/stay-safe-from-12-million-cpra-fines-4gl9
|
https://dev.to/mehwish_malik_4f29ff7fb04/stay-safe-from-12-million-cpra-fines-4gl9
| 0
| 1
| null |
2024-12-09T11:35:17Z
|
en
| null | 1
|
https://dev.to/mehwish_malik_4f29ff7fb04/stay-safe-from-12-million-cpra-fines-4gl9
|
2024-12-09T11:35:18Z
| null | null |
2024-12-09T11:35:17Z
|
2024-12-09T11:35:17Z
| 4
|
['cpra', 'fines', 'seers', 'compliance']
|
cpra, fines, seers, compliance
|
{'name': 'Mehwish Malik', 'username': 'mehwish_malik_4f29ff7fb04', 'twitter_username': None, 'github_username': 'Mehwish-Seers', 'user_id': 2307864, 'website_url': 'https://seersco.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2307864%2F79c4fefe-9b82-44ef-a7db-18ea6b24e16a.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2307864%2F79c4fefe-9b82-44ef-a7db-18ea6b24e16a.png'}
| null | null | 570,792
|
||
article
| 2,131,302
|
Elon Musk's Cookie Banner Critique: A Seers Global Compliance Perspective
|
Recent comments by Elon Musk criticizing cookie banners have sparked a crucial debate about digital...
|
Dec 2 '24
|
elon-musks-cookie-banner-critique-a-seers-global-compliance-perspective-39aj
|
/mehwish_malik_4f29ff7fb04/elon-musks-cookie-banner-critique-a-seers-global-compliance-perspective-39aj
|
https://dev.to/mehwish_malik_4f29ff7fb04/elon-musks-cookie-banner-critique-a-seers-global-compliance-perspective-39aj
| 0
| 1
| null |
2024-12-02T13:34:05Z
|
en
| null | 1
|
https://dev.to/mehwish_malik_4f29ff7fb04/elon-musks-cookie-banner-critique-a-seers-global-compliance-perspective-39aj
|
2024-12-02T13:34:06Z
| null | null |
2024-12-02T13:34:05Z
|
2024-12-02T13:34:05Z
| 2
|
['globalprivacy', 'compliance', 'cookiebanner', 'elonmusk']
|
globalprivacy, compliance, cookiebanner, elonmusk
|
{'name': 'Mehwish Malik', 'username': 'mehwish_malik_4f29ff7fb04', 'twitter_username': None, 'github_username': 'Mehwish-Seers', 'user_id': 2307864, 'website_url': 'https://seersco.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2307864%2F79c4fefe-9b82-44ef-a7db-18ea6b24e16a.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2307864%2F79c4fefe-9b82-44ef-a7db-18ea6b24e16a.png'}
| null | null | 570,793
|
||
article
| 2,041,391
|
AI Proctoring in Compliance Training: Enhancing Standards and Ensuring Integrity
|
In the corporate world, compliance training is a cornerstone of maintaining legal, ethical, and...
|
Oct 17 '24
|
ai-proctoring-in-compliance-training-enhancing-standards-and-ensuring-integrity-k5e
|
/vedantsingh/ai-proctoring-in-compliance-training-enhancing-standards-and-ensuring-integrity-k5e
|
https://dev.to/vedantsingh/ai-proctoring-in-compliance-training-enhancing-standards-and-ensuring-integrity-k5e
| 0
| 0
| null |
2024-10-17T03:43:04Z
|
en
| null | 0
|
https://dev.to/vedantsingh/ai-proctoring-in-compliance-training-enhancing-standards-and-ensuring-integrity-k5e
|
2024-10-17T03:43:05Z
|
2024-10-17T03:50:08Z
| null |
2024-10-17T03:43:04Z
|
2024-10-17T03:43:04Z
| 4
|
['ai', 'aiproctoring', 'compliance', 'learning']
|
ai, aiproctoring, compliance, learning
|
{'name': 'Vedant', 'username': 'vedantsingh', 'twitter_username': None, 'github_username': None, 'user_id': 2218411, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2218411%2F76d68ca2-07c5-4ab9-ba72-2ea852debcef.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2218411%2F76d68ca2-07c5-4ab9-ba72-2ea852debcef.png'}
| null | null | 570,794
|
||
article
| 2,077,488
|
Conventional Use of AWS CDK
|
Infrastructure as code, a principal rule of agility and reliability, helps deliver configurable...
|
Nov 5 '24
|
conventional-use-of-aws-cdk-g0m
|
/aws-builders/conventional-use-of-aws-cdk-g0m
|
https://dev.to/aws-builders/conventional-use-of-aws-cdk-g0m
| 0
| 3
| null |
2024-11-05T00:43:01Z
|
en
| null | 3
|
https://serverlessfolks.com/conventional-use-of-aws-cdk
|
2024-11-05T00:31:49Z
|
2025-02-01T17:33:03Z
|
2024-11-05T00:43:01Z
|
2024-11-04T00:10:29Z
|
2024-11-04T00:10:29Z
| 7
|
['enablement', 'awscdk', 'compliance', 'governance']
|
enablement, awscdk, compliance, governance
|
{'name': 'Omid Eidivandi', 'username': 'eidivandi', 'twitter_username': 'Eidivandi', 'github_username': None, 'user_id': 973250, 'website_url': 'http://serverlessfolks.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F973250%2F5e88a1f9-503e-487b-ac0f-6f3abda7f0a3.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F973250%2F5e88a1f9-503e-487b-ac0f-6f3abda7f0a3.jpg'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,795
|
||
article
| 2,030,927
|
Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.
|
Trust but verify is a phrase often attributed to former U.S. President Ronald Reagan, particularly in...
|
Oct 9 '24
|
strengthening-security-and-compliance-in-aws-cloud-services-the-essential-role-of-ai-verification-3ep5
|
/adeolaogunkola/strengthening-security-and-compliance-in-aws-cloud-services-the-essential-role-of-ai-verification-3ep5
|
https://dev.to/adeolaogunkola/strengthening-security-and-compliance-in-aws-cloud-services-the-essential-role-of-ai-verification-3ep5
| 0
| 0
| null |
2024-10-09T02:21:27Z
|
en
| null | 0
|
https://dev.to/adeolaogunkola/strengthening-security-and-compliance-in-aws-cloud-services-the-essential-role-of-ai-verification-3ep5
|
2024-10-09T02:21:28Z
| null | null |
2024-10-09T02:21:27Z
|
2024-10-09T02:21:27Z
| 4
|
['security', 'compliance', 'trust', 'aws']
|
security, compliance, trust, aws
|
{'name': 'Ogunkola Adeola ', 'username': 'adeolaogunkola', 'twitter_username': None, 'github_username': 'Adeolaogunkola', 'user_id': 839121, 'website_url': 'https://github.com/Adeolaogunkola', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F839121%2Fa650b4df-fe38-4bbb-8ab0-ddcd7fe809cf.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F839121%2Fa650b4df-fe38-4bbb-8ab0-ddcd7fe809cf.jpg'}
| null | null | 570,796
|
||
article
| 2,030,469
|
Guia super Resumido do PCI-DSS
|
O que é o PCI-DSS? O PCI-DSS (Payment Card Industry Data Security Standard) é um conjunto...
|
Oct 8 '24
|
guia-resumido-pci-dss-3hek
|
/bt0/guia-resumido-pci-dss-3hek
|
https://dev.to/bt0/guia-resumido-pci-dss-3hek
| 0
| 1
| null |
2024-10-08T17:37:27Z
|
pt
| null | 1
|
https://dev.to/bt0/guia-resumido-pci-dss-3hek
|
2024-10-08T17:26:35Z
|
2024-10-08T17:46:32Z
| null |
2024-10-08T17:37:27Z
|
2024-10-08T17:37:27Z
| 6
|
['pcidss', 'security', 'compliance']
|
pcidss, security, compliance
|
{'name': 'Humberto "bt0" Júnior', 'username': 'bt0', 'twitter_username': None, 'github_username': 'halencarjunior', 'user_id': 1577320, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1577320%2F47e0e4b1-76f7-40ec-b8c8-8c8dcfa12403.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1577320%2F47e0e4b1-76f7-40ec-b8c8-8c8dcfa12403.jpeg'}
| null | null | 570,797
|
||
article
| 2,030,204
|
How will NIS2 affect European Industries
|
The European NIS2 directive is coming to Europe to set a new high bar on the union's...
|
Oct 8 '24
|
how-will-nis2-affect-european-industries-4i87
|
/capitangolo/how-will-nis2-affect-european-industries-4i87
|
https://dev.to/capitangolo/how-will-nis2-affect-european-industries-4i87
| 0
| 0
| null |
2024-10-08T13:13:23Z
|
en
| null | 0
|
https://safetybits.io/blog/nis2-affect-european-industries/
|
2024-10-08T13:13:23Z
|
2024-10-10T14:18:28Z
| null |
2024-10-08T13:13:23Z
|
2024-10-08T13:13:23Z
| 8
|
['security', 'industrial', 'compliance', 'nis2']
|
security, industrial, compliance, nis2
|
{'name': 'Víctor Jiménez Cerrada', 'username': 'capitangolo', 'twitter_username': None, 'github_username': 'capitangolo', 'user_id': 574059, 'website_url': 'http://capitangolo.net', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F574059%2F32a498c1-5d90-4835-8cce-780b26de7b26.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F574059%2F32a498c1-5d90-4835-8cce-780b26de7b26.jpg'}
| null | null | 570,798
|
||
article
| 2,002,264
|
The Broad Scope of GxP Compliance: Beyond Healthcare to Life Sciences, Food, and Pharmaceuticals
|
Healthcare and life sciences industry is governed by GxP compliance. GxP means “Good Practice”. This...
|
Sep 16 '24
|
the-broad-scope-of-gxp-compliance-beyond-healthcare-to-life-sciences-food-and-pharmaceuticals-a8c
|
/rohitbhandari102/the-broad-scope-of-gxp-compliance-beyond-healthcare-to-life-sciences-food-and-pharmaceuticals-a8c
|
https://dev.to/rohitbhandari102/the-broad-scope-of-gxp-compliance-beyond-healthcare-to-life-sciences-food-and-pharmaceuticals-a8c
| 0
| 0
| null |
2024-09-16T07:02:04Z
|
en
| null | 0
| null |
https://medicalresearch.com/the-broad-scope-of-gxp-compliance-beyond-healthcare-to-life-sciences-food-and-pharmaceuticals/
|
2024-09-16T07:02:05Z
| null | null |
2024-09-16T07:02:04Z
|
2024-09-16T07:02:04Z
| 3
|
['gxp', 'compliance']
|
gxp, compliance
|
{'name': 'Rohit Bhandari', 'username': 'rohitbhandari102', 'twitter_username': 'opkeyseo', 'github_username': None, 'user_id': 967586, 'website_url': 'https://www.opkey.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F967586%2Fdfbb7259-1a88-4543-bb2a-4eeb8274c4f7.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F967586%2Fdfbb7259-1a88-4543-bb2a-4eeb8274c4f7.png'}
| null | null | 570,799
|
|
article
| 1,945,209
|
Future Trends in Video KYC and Financial Security
|
As the financial industry continues to evolve in the digital age, Video KYC (Know Your Customer) has...
|
Aug 2 '24
|
future-trends-in-video-kyc-and-financial-security-33ic
|
/lokeshjoshi/future-trends-in-video-kyc-and-financial-security-33ic
|
https://dev.to/lokeshjoshi/future-trends-in-video-kyc-and-financial-security-33ic
| 0
| 1
| null |
2024-08-02T10:59:13Z
|
en
| null | 1
|
https://dev.to/lokeshjoshi/future-trends-in-video-kyc-and-financial-security-33ic
|
2024-08-02T10:49:09Z
| null | null |
2024-08-02T10:59:13Z
|
2024-08-02T10:59:13Z
| 4
|
['videokyc', 'kyc', 'compliance', 'webdev']
|
videokyc, kyc, compliance, webdev
|
{'name': 'Lokesh Joshi', 'username': 'lokeshjoshi', 'twitter_username': 'lokeshjoshi94', 'github_username': 'lokeshjoshi93', 'user_id': 395456, 'website_url': 'https://www.kychub.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F395456%2Faceb02e0-5322-482b-9ddf-b67513d64569.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F395456%2Faceb02e0-5322-482b-9ddf-b67513d64569.jpg'}
| null | null | 570,800
|
||
article
| 1,945,089
|
Enforcing Kubernetes Policies with Gatekeeper
|
In the rapidly evolving world of cloud-native environments, maintaining security and compliance is...
|
Aug 2 '24
|
enforcing-kubernetes-policies-with-gatekeeper-5c33
|
/victorleungtw/enforcing-kubernetes-policies-with-gatekeeper-5c33
|
https://dev.to/victorleungtw/enforcing-kubernetes-policies-with-gatekeeper-5c33
| 0
| 0
| null |
2024-08-02T09:26:18Z
|
en
| null | 0
| null |
https://victorleungtw.com/2024/08/02/gatekeeper/
|
2024-08-02T09:26:19Z
| null | null |
2024-08-02T09:26:18Z
|
2024-08-02T09:26:18Z
| 3
|
['kubernetes', 'security', 'compliance', 'policies']
|
kubernetes, security, compliance, policies
|
{'name': 'Victor Leung', 'username': 'victorleungtw', 'twitter_username': 'victorleungtw', 'github_username': 'victorleungtw', 'user_id': 277621, 'website_url': 'https://victorleungtw.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F277621%2F060f42a3-ff9b-4470-a1e2-b251a6cdf8cf.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F277621%2F060f42a3-ff9b-4470-a1e2-b251a6cdf8cf.png'}
| null | null | 570,801
|
|
article
| 1,941,934
|
From Policy to Compliance: Unpacking the Key Annexures of ISO 27001
|
In the world of ISO 27001, the international standard for information security management, whether...
|
Aug 4 '24
|
from-policy-to-compliance-unpacking-the-key-annexures-of-iso-27001-gpn
|
/rieesteves/from-policy-to-compliance-unpacking-the-key-annexures-of-iso-27001-gpn
|
https://dev.to/rieesteves/from-policy-to-compliance-unpacking-the-key-annexures-of-iso-27001-gpn
| 0
| 1
| null |
2024-08-04T18:54:32Z
|
en
| null | 1
|
https://dev.to/rieesteves/from-policy-to-compliance-unpacking-the-key-annexures-of-iso-27001-gpn
|
2024-07-31T03:38:12Z
|
2024-08-23T16:30:49Z
| null |
2024-08-04T18:54:32Z
|
2024-08-04T18:54:32Z
| 3
|
['iso27001', 'auditing', 'annex', 'compliance']
|
iso27001, auditing, annex, compliance
|
{'name': 'Riean Esteves', 'username': 'rieesteves', 'twitter_username': None, 'github_username': 'Rieesteves', 'user_id': 704913, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F704913%2F8faea62f-316e-4208-a746-bce17e9eb646.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F704913%2F8faea62f-316e-4208-a746-bce17e9eb646.jpeg'}
| null | null | 570,802
|
||
article
| 1,891,553
|
GxP Compliance: Leveraging Test Automation for Validation and Security
|
Enterprises in every industry need efficient software. However, some industries are much more...
|
Jun 17 '24
|
gxp-compliance-leveraging-test-automation-for-validation-and-security-10c4
|
/johnste39558689/gxp-compliance-leveraging-test-automation-for-validation-and-security-10c4
|
https://dev.to/johnste39558689/gxp-compliance-leveraging-test-automation-for-validation-and-security-10c4
| 0
| 0
| null |
2024-06-17T18:05:25Z
|
en
| null | 0
| null |
https://www.opkey.com/blog/gxp-compliance-leveraging-test-automation-for-validation-and-security
|
2024-06-17T18:05:26Z
| null | null |
2024-06-17T18:05:25Z
|
2024-06-17T18:05:25Z
| 4
|
['gxp', 'compliance']
|
gxp, compliance
|
{'name': 'John Stein', 'username': 'johnste39558689', 'twitter_username': 'JohnSte39558689', 'github_username': None, 'user_id': 997727, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F997727%2Fc3c3427b-9a49-435c-b851-60dc61e7c833.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F997727%2Fc3c3427b-9a49-435c-b851-60dc61e7c833.png'}
| null | null | 570,803
|
|
article
| 1,919,348
|
Working Towards Compliance through ITGC !
|
In the auditing world , the focus is on verifying compliance with procedures by addressing the key...
|
Jul 11 '24
|
working-towards-compliance-through-itgc--185e
|
/rieesteves/working-towards-compliance-through-itgc--185e
|
https://dev.to/rieesteves/working-towards-compliance-through-itgc--185e
| 1
| 5
| null |
2024-07-11T09:40:35Z
|
en
| null | 5
|
https://dev.to/rieesteves/working-towards-compliance-through-itgc--185e
|
2024-07-11T06:39:00Z
|
2024-07-11T09:56:17Z
| null |
2024-07-11T09:40:35Z
|
2024-07-12T13:33:14Z
| 2
|
['auditing', 'compliance', 'informationsecurity', 'itgc']
|
auditing, compliance, informationsecurity, itgc
|
{'name': 'Riean Esteves', 'username': 'rieesteves', 'twitter_username': None, 'github_username': 'Rieesteves', 'user_id': 704913, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F704913%2F8faea62f-316e-4208-a746-bce17e9eb646.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F704913%2F8faea62f-316e-4208-a746-bce17e9eb646.jpeg'}
| null | null | 570,804
|
||
article
| 1,913,939
|
AWS Security Hub
|
Hace unas semanas tuve la oportunidad de compartir en el canal de youtube de AWS Women Colombia una...
|
Jul 6 '24
|
aws-security-hub-3n19
|
/cyb3rcloud8888/aws-security-hub-3n19
|
https://dev.to/cyb3rcloud8888/aws-security-hub-3n19
| 0
| 0
| null |
2024-07-06T16:29:16Z
|
es
| null | 0
|
https://dev.to/cyb3rcloud8888/aws-security-hub-3n19
|
2024-07-06T16:25:13Z
| null | null |
2024-07-06T16:29:16Z
|
2024-07-06T16:29:16Z
| 4
|
['aws', 'cloudsecurity', 'compliance']
|
aws, cloudsecurity, compliance
|
{'name': 'Willie', 'username': 'cyb3rcloud8888', 'twitter_username': None, 'github_username': None, 'user_id': 1236349, 'website_url': 'https://www.linkedin.com/in/williereyes/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1236349%2F60e8f978-f2a6-4a2f-abdc-73cb29164d45.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1236349%2F60e8f978-f2a6-4a2f-abdc-73cb29164d45.jpg'}
| null | null | 570,805
|
||
article
| 1,904,456
|
Understanding the Impacts of Federal Acquisition Streamlining Act FASA
|
Learn how FASA has simplified the federal procurement process and what it means for contractors, including key provisions and practical tips for compliance.
|
Jun 28 '24
|
understanding-the-impacts-of-federal-acquisition-streamlining-act-fasa-1jee
|
/quantumcybersolution/understanding-the-impacts-of-federal-acquisition-streamlining-act-fasa-1jee
|
https://dev.to/quantumcybersolution/understanding-the-impacts-of-federal-acquisition-streamlining-act-fasa-1jee
| 0
| 0
| null |
2024-06-28T16:05:54Z
|
en
| null | 0
|
https://www.govcon.me/blog/understanding_the_impacts_of_federal_acquisition_streamlining_act_fasa
|
2024-06-28T16:05:55Z
| null | null |
2024-06-28T16:05:54Z
|
2024-06-28T16:05:54Z
| 3
|
['governmentcontracting', 'fasa', 'federalprocurement', 'compliance']
|
governmentcontracting, fasa, federalprocurement, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,806
|
||
article
| 1,904,442
|
Understanding the Defense Federal Acquisition Regulation Supplement DFARS
|
Learn the key aspects of DFARS that contractors must comply with when working on defense-related contracts, including cybersecurity requirements and ethical considerations.
|
Jun 28 '24
|
understanding-the-defense-federal-acquisition-regulation-supplement-dfars-1pja
|
/quantumcybersolution/understanding-the-defense-federal-acquisition-regulation-supplement-dfars-1pja
|
https://dev.to/quantumcybersolution/understanding-the-defense-federal-acquisition-regulation-supplement-dfars-1pja
| 0
| 0
| null |
2024-06-28T15:55:40Z
|
en
| null | 0
|
https://www.govcon.me/blog/understanding_the_defense_federal_acquisition_regulation_supplement_dfars
|
2024-06-28T15:55:40Z
| null | null |
2024-06-28T15:55:40Z
|
2024-06-28T15:55:40Z
| 3
|
['governmentcontracting', 'dfars', 'cybersecurity', 'compliance']
|
governmentcontracting, dfars, cybersecurity, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,807
|
||
article
| 1,904,420
|
Understanding and Utilizing the Defense Contract Audit Agency DCAA Compliance
|
Learn the importance of DCAA compliance for government contractors, including how to prepare for audits and ensure your accounting systems meet government standards.
|
Jun 28 '24
|
understanding-and-utilizing-the-defense-contract-audit-agency-dcaa-compliance-448m
|
/quantumcybersolution/understanding-and-utilizing-the-defense-contract-audit-agency-dcaa-compliance-448m
|
https://dev.to/quantumcybersolution/understanding-and-utilizing-the-defense-contract-audit-agency-dcaa-compliance-448m
| 0
| 0
| null |
2024-06-28T15:34:59Z
|
en
| null | 0
|
https://www.govcon.me/blog/understanding_and_utilizing_the_defense_contract_audit_agency_dcaa_compliance
|
2024-06-28T15:35:00Z
| null | null |
2024-06-28T15:34:59Z
|
2024-06-28T15:34:59Z
| 2
|
['governmentcontracting', 'dcaa', 'compliance', 'audit']
|
governmentcontracting, dcaa, compliance, audit
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,808
|
||
article
| 1,904,395
|
The Role of Independent Contractors in Government Projects Advantages Challenges and Best Practices
|
Understand the advantages and challenges of using independent contractors in government projects, including compliance considerations and tips for managing contractor relationships.
|
Jun 28 '24
|
the-role-of-independent-contractors-in-government-projects-advantages-challenges-and-best-practices-3j60
|
/quantumcybersolution/the-role-of-independent-contractors-in-government-projects-advantages-challenges-and-best-practices-3j60
|
https://dev.to/quantumcybersolution/the-role-of-independent-contractors-in-government-projects-advantages-challenges-and-best-practices-3j60
| 0
| 0
| null |
2024-06-28T15:19:37Z
|
en
| null | 0
|
https://www.govcon.me/blog/the_role_of_independent_contractors_in_government_projects_advantages_challenges_and_best_practices
|
2024-06-28T15:19:38Z
| null | null |
2024-06-28T15:19:37Z
|
2024-06-28T15:19:37Z
| 3
|
['governmentcontracting', 'independentcontractors', 'compliance', 'contractormanagement']
|
governmentcontracting, independentcontractors, compliance, contractormanagement
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,809
|
||
article
| 1,904,380
|
The Pre-Award Survey What It Is and How to Prepare
|
Learn what a pre-award survey is, why its important, and how to best prepare your business to ace it and land that all-important government contract.
|
Jun 28 '24
|
the-pre-award-survey-what-it-is-and-how-to-prepare-2fgn
|
/quantumcybersolution/the-pre-award-survey-what-it-is-and-how-to-prepare-2fgn
|
https://dev.to/quantumcybersolution/the-pre-award-survey-what-it-is-and-how-to-prepare-2fgn
| 0
| 0
| null |
2024-06-28T15:09:23Z
|
en
| null | 0
|
https://www.govcon.me/blog/the_pre_award_survey_what_it_is_and_how_to_prepare
|
2024-06-28T15:09:23Z
| null | null |
2024-06-28T15:09:23Z
|
2024-06-28T15:09:23Z
| 3
|
['governmentcontracts', 'businessdevelopment', 'compliance']
|
governmentcontracts, businessdevelopment, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,810
|
||
article
| 1,904,505
|
Utilizing the System for Award Management SAM for Government Contracting Success
|
Learn how to effectively navigate and leverage the SAM database to find contracting opportunities, maintain compliance, and enhance your visibility with federal agencies.
|
Jun 28 '24
|
utilizing-the-system-for-award-management-sam-for-government-contracting-success-1599
|
/quantumcybersolution/utilizing-the-system-for-award-management-sam-for-government-contracting-success-1599
|
https://dev.to/quantumcybersolution/utilizing-the-system-for-award-management-sam-for-government-contracting-success-1599
| 0
| 0
| null |
2024-06-28T16:52:00Z
|
en
| null | 0
|
https://www.govcon.me/blog/utilizing_the_system_for_award_management_sam_for_government_contracting_success
|
2024-06-28T16:52:01Z
| null | null |
2024-06-28T16:52:00Z
|
2024-06-28T16:52:00Z
| 3
|
['governmentcontracting', 'sam', 'federalcontracts', 'compliance']
|
governmentcontracting, sam, federalcontracts, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,811
|
||
article
| 1,903,652
|
Preparing for Cybersecurity Maturity Model Certification CMMC
|
Dive into the essentials of preparing for the Cybersecurity Maturity Model Certification (CMMC) and discover how to protect your business with top-tier cybersecurity strategies.
|
Jun 28 '24
|
preparing-for-cybersecurity-maturity-model-certification-cmmc-3jke
|
/quantumcybersolution/preparing-for-cybersecurity-maturity-model-certification-cmmc-3jke
|
https://dev.to/quantumcybersolution/preparing-for-cybersecurity-maturity-model-certification-cmmc-3jke
| 0
| 0
| null |
2024-06-28T05:43:55Z
|
en
| null | 0
|
https://www.govcon.me/blog/preparing_for_cybersecurity_maturity_model_certification_cmmc
|
2024-06-28T05:43:56Z
| null | null |
2024-06-28T05:43:55Z
|
2024-06-28T05:43:55Z
| 3
|
['cybersecurity', 'cmmc', 'compliance']
|
cybersecurity, cmmc, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,812
|
||
article
| 1,903,640
|
Past Performance How It Impacts Your Ability to Win Government Contracts
|
Discover the significant role past performance plays in securing government contracts and learn how to leverage your company’s history for future success.
|
Jun 28 '24
|
past-performance-how-it-impacts-your-ability-to-win-government-contracts-3ao0
|
/quantumcybersolution/past-performance-how-it-impacts-your-ability-to-win-government-contracts-3ao0
|
https://dev.to/quantumcybersolution/past-performance-how-it-impacts-your-ability-to-win-government-contracts-3ao0
| 0
| 0
| null |
2024-06-28T05:23:26Z
|
en
| null | 0
|
https://www.govcon.me/blog/past_performance_how_it_impacts_your_ability_to_win_government_contracts
|
2024-06-28T05:23:27Z
| null | null |
2024-06-28T05:23:26Z
|
2024-06-28T05:23:26Z
| 3
|
['governmentcontracts', 'businessstrategy', 'compliance']
|
governmentcontracts, businessstrategy, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,813
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.