Norbert__

Norbert__'s avatar'

speaks: Hungarian

learns: English, Spanish

Norbert__'s avatar'
Recent Posts
Stats
headline image

Choosing a new country

Well ... It's time to move to a new country. I had wanted to move to the US to my ex, until my recent breakup but it's time to figure out what my new destination is, now that the US is off the table.
3
15
Jan 26 - 2 min. read

Read post

headline image

The Weight of Three Months

It's been three months since I broke up with my ex. You'd think it would get easier day by day, but on the contrary, it's getting more and more difficult. It was my decision, but it doesn't make
3
12
Jan 25 - 1 min. read

Read post

headline image

The Journey from Your Keyboard to Google

Have you ever thought about what happens when you type google.com and press enter? What exactly is happening in the background? Well, Think no more because I'm about to tell you: It’s a process that
1
11
Jan 21 - 3 min. read

Read post

headline image

SSG - Secure Service Gateway

A Secure Service Gateway (SSG) is an advanced network security solution that acts as a "checkpoint" for all data entering and leaving your network. While it performs many of the same tasks as the
1
0
Jan 20 - 1 min. read

Read post

headline image

HTTPS proxy

An HTTPS proxy is an intermediary server that sits between your computer and the internet. When you use an HTTPS proxy to visit a secure site like Google.com, the proxy uses a method called HTTP
2
2
Jan 20 - 1 min. read

Read post

headline image

I’m Trading My Code Editor for Content Creation

As you might have noticed, I post a lot of technology-related posts. Well, there is a reason why I'm doing this. I want to improve my tech skills, but I'm not in the mood to code at home because it's
4
14
Jan 20 - 1 min. read

Read post

headline image

OWASP TOP 10 - A01: Broken Access Control & Interview Questions

A01: Broken Access Control holds the #1 spot as the most critical web application security risk. Access control ensures that users cannot act outside of their intended permissions. When it is
1
3
Jan 15 - 2 min. read

Read post

headline image

mTLS

mTLS, which stands for Mutual Transport Layer Security, is a security method where both parties in a network connection (the client and the server) authenticate each other simultaneously. In standard
0
0
Jan 14 - 1 min. read

Read post

headline image

Normal function vs Arrow function

So, what are the main differences between normal functions and arrow functions Normal Function: Has its own this. The value of this is dynamic. it depends on how the function is called. Arrow
1
0
Jan 13 - 1 min. read

Read post

headline image

The most popular influencers are weirdos

I've realized that most of the influencers who have become really popular in the past five years are the weirdest people you can imagine. They're either the most incel guys you can imagine, or men
4
4
Jan 13 - 1 min. read

Read post

headline image

The British: the misunderstood souls

 I've come to the conclusion that British people are misunderstood souls. Everyone keeps complaining about them when they're visiting a place as tourists because they're rude and trashy. But I've
3
11
Jan 13 - 1 min. read

Read post

headline image

Recursion

Recursion is a process in which a function calls itself until a specific condition is met. It is highly effective because of its elegance, especially when working with trees, graphs, or nested
1
0
Dec 29 - 1 min. read

Read post

headline image

Function Currying

So, What is Currying in Software Engineering? Currying is a functional programming method that is used to pre-load functions and reuse them later. Example: A Discount Calculator Imagine you want to
1
3
Dec 29 - 1 min. read

Read post

headline image

Memoization

So, what is memoization in software engineering? Memoization is a fancy word for a simple concept: caching the result of a function so you don't have to calculate it again. The function saves the
2
0
Dec 29 - 1 min. read

Read post

headline image

Money making rules as a Eastern European

1. Learn English – The better you speak it, the more you can command higher prices. This increases the arbitrage between what you make and what you spend in Eastern Europe. 2. Learn a white collar
0
6
Dec 28 - 1 min. read

Read post

headline image

How to Clean your home - Sink and Toilet

First of all, clear everything that can be in the way. It makes wiping easier. Sink: Before I grab any cleaner, I do a dry wipe down to remove hair, dust, etc. You can clean the faucet aerator(?)
1
5
Dec 28 - 1 min. read

Read post

headline image

How to Clean your home - Basics

Today I'm going to write about how to clean your home. First step: Clearing the room. Put away everything. Dusting: I use just a rag or a cloth. When you're dusting, it's smart to work from the top
1
0
Dec 28 - 1 min. read

Read post

headline image

Introduction to security practises: Running Node.js as a non-root user & vulnerability inspection & Vulnerability inspection

root user: It means that the user can do everything on that server. Basically, god mode. If you use a container, you probably use Node.js as a root user. The problem is that if a hacker gets a hold
1
0
Dec 27 - 1 min. read

Read post

headline image

How to change a doorknob

Most doors have standardized doorknobs, and almost all of them have two large screws that are long enough to reach through/get across(?) the other side of the door. Just loosen them with a
1
18
Dec 27 - 1 min. read

Read post

headline image

Pliers

Keep a basic pair of pliers to loosen a knot or bolt. Use needle-nose pliers for tight spaces or if you want to cut something. Channel locks have multiple settings — hence the channels.
1
5
Dec 27 - 1 min. read

Read post