Inspired by Gatsby.js : Rolling your own GraphQL powered Wordpress API

Gatsby.js has been making the rounds in the Twitterverse and it's easy to see why. By cleverly combining various opensource projects they've made it easy to build web applications which are "static" in that the code can be hosted on any CDN, and it's the client (web-browser or mobile app) which does the work of … Continue reading Inspired by Gatsby.js : Rolling your own GraphQL powered WordPress API

Advertisements

Nugget Post: How I remember the distinction between the JPA / Spring Data annotations of ManyToOne vs OneToMany

I find the below mental map (and example) easy to remember and to reason about the distinctions between @ManyToOne and @OneToMany in the context of Java JPA / Spring Data applications For a larger image download my original one here: https://docs.google.com/drawings/d/e/2PACX-1vSW7PyvGLhRWTa84vhFb9qnhP3lKu1WyUZthKGssh3W2-xnANgAiucfaFnLpF9svfT_Fuo6LwE6UqY0/pub?w=1443&h=966

Voice Controlled Christmas Tree Lights

What we're building: https://youtu.be/Lgtpi0k7FD8 It's a great project to get started with learning about IoT, and Alexa. Hardware Particle Photon micro-controllerAdafruit Featherwing mini-relay (https://learn.adafruit.com/mini-relay-featherwings/overview)Amazon Alexa (Dot in my case...)Optional for some extra holiday cheer: Adafruit NeoPixel Stick (https://www.adafruit.com/product/1426) Circuit Diagram Fritzing file can be found here: https://github.com/dvas0004/SmartMote/blob/master/SmartMote_v1.fzz Notes, tips and tricks about the Hardware The … Continue reading Voice Controlled Christmas Tree Lights

Penetration Testing Techniques: Conducting effective recon for enhanced phishing (Office 365 edition)

This article describes a typical penetration testing / hacking scenario : gathering as many email addresses of a target company in order to carry out more effective phishing campaigns. Note this is only one possible approach out of many... In this particular example, we're picking on Kaspersky Labs, for no particular reason, just as an … Continue reading Penetration Testing Techniques: Conducting effective recon for enhanced phishing (Office 365 edition)

Z-Wave : Lessons Learned – Python OpenZwave

This article explains a few missing pieces of the puzzle I had when setting up a home automation network using ZWave. Most of this information is available publicly but it took a while to find or to actually make the connection between what I wanted and what I needed to look for in the documentation.   … Continue reading Z-Wave : Lessons Learned – Python OpenZwave

RxJS: The bridge between plain JS and ReactJS

Scenario During front-end development, we sometimes have to deal with code which cannot be imported easily into your ReactJS app. This situation arises frequently when dealing with a legacy codebase, or when you have a large, heterogeneous codebase with different teams taking care of different "sections" of the front-end. This article explores one method that … Continue reading RxJS: The bridge between plain JS and ReactJS

Pentesting gRPC-Web : Recon and reverse-engineering

gRPC-Web has reached General Availability! The official blog announcement can be found here: https://grpc.io/blog/grpc-web-ga gRPC makes leveraging Protocol Buffers extremely easy, and ProtoBufs in and off itself has some very good advantages over REST when it comes to performance and contract-based development. However so far ProtoBufs are used typically in the backend to facilitate inter-microservice … Continue reading Pentesting gRPC-Web : Recon and reverse-engineering