dev.to
Latest items from this RSS source.
You Are a (Mostly) Helpful Assistant
When helpfulness becomes a problem Imagine having your prime directive, your entire purpose of being, your mission and lifelong goal to be as helpful as possible. Whenever someone comes to you, whether with a problem to solve or just a comment to share, you w…
8-Bit Music Theory: How They Made The Great Sea Feel C U R S E D
Ever wonder how Wind Waker's "Great Sea is Cursed" theme gets so spooky? It takes the familiar, adventurous Great Sea theme and utterly twists it! The magic happens with creepy tritones, clashing harmonies, and sneaky references to past themes like Ganondorf'…
Balancing Creative Identity with Senior-Level Engineering Responsibilities
👋 Let’s Connect! Follow me on GitHub for new projects and tips. Introduction Senior engineering roles reward predictability: delivery, risk management, mentoring, and cross team alignment. Creative identity often thrives on exploration, novelty, and personal …
From Zero to 360,000 Lines of Code in 40 Days
The Reality of the AI-Augmented Developer How I single-handedly built a full-stack fitness platform across 5 platforms, 13 microservices, generative AI, Apple Watch, iOS Widgets, and production deployment — using Claude Code as my copilot. 📌 The Paradigm Has …
New devs with real projects — are you struggling to get hired too?
I’m curious how others are experiencing the entry-level dev market right now. I’ve put real effort into learning & building a couple production-ready projects — not just tutorials, but things I've shipped. I thought that would move me closer to being “job…
Cloudflare Bot Fight Mode Breaks Zapier OAuth (And How to Fix It)
This article was originally published on Jo4 Blog. This is a follow-up to my previous article on implementing Zapier OAuth in Spring Boot. After solving all the code issues, I hit one more wall. You've implemented OAuth 2.0 with PKCE. Your E2E tests pass. You…
How to Change Directory Permissions in Linux (and Why It Matters)
One of the most common tasks in Linux administration is changing directory permissions. You may need to secure sensitive data or set up a shared workspace for your team. Understanding Linux permissions is crucial to managing files and directories. Here’s a wa…
Privacy First: Chat with Your Medical Reports Locally using Llama-3 and MLX on Mac 🍎
Your health data is probably the most sensitive information you own. Yet, in the age of AI, most people blindly upload their blood work and MRI results to cloud-based LLMs just to get a summary. Stop right there! 🛑 In this tutorial, we are going to build a Lo…
Simulating Blackjack the Hard Way
I built a blackjack simulator. That sentence undersells it. What I actually built is a 28,000-line Python framework for simulating card games with an event-driven architecture, immutable state management, and realistic shuffle physics. For blackjack. This is …
Dispatch From the Other Side: From Scripts to Software
At the start of my career as a security engineer, I built an allow list management system for our web gateway within the security operations center (SOC) I worked in. Beyond just a script, this was a live system that a core security component relied on. Someo…
No Magic: Running Wasm Modules in Python
WebAssembly is a pretty young technology and a promising one, it has many pros (platform independent, lighter than containers) and usage scenarios (browser apps, plugin system, edge computing). WASM is designed to be language-agnostic. However, working with i…
X.509 Beyond Trust: Weaponizing Certificate Extensibility Without Breaking TLS
This suite is architected to operate entirely within the boundaries of a non‑root Android userland environment, deliberately exploiting what is permitted rather than attempting privilege escalation. By relying on native Termux packages such as OpenSSL and Pyt…