#100daysofSRE (Day 21): How to use Supervisor to manage a script on Linux
Managing and automating scripts on Linux systems is crucial for ensuring smooth operations. One effective solution for this is Supervisor, which is a powerfu...
Managing and automating scripts on Linux systems is crucial for ensuring smooth operations. One effective solution for this is Supervisor, which is a powerfu...
awk
Command: Basic and Templates
awk is a versatile tool that can be used to search, filter, and manipulate text files, making it a go-to tool for site reliability engineers. In this blog po...
In site reliability engineering, log analysis is a crucial aspect of maintaining system availability and identifying potential issues. However, analyzing log...
Your blog post excerpt
In SRE, performance optimization and tuning are crucial for ensuring systems can quickly handle expected workloads and respond to user requests. This involve...
High availability and redundancy are critical components of any successful data management strategy. In Site Reliability Engineering (SRE), ensuring the avai...
Disaster recovery planning is a critical aspect of SRE that involves preparing for and mitigating the impact of catastrophic events that could disrupt your s...
In Day 14 of #100daysofSRE, we dive into the world of load testing and stress testing in Site Reliability Engineering (SRE). Load testing and stress testing ...
In this post, I’ll dive into capacity planning and management in SRE, including its importance, techniques, tools, and best practices. I’ll also explore capa...
In this blog post, I’ll dive into the topic of alerting and notification strategies for Site Reliability Engineering (SRE). Alerting and notification are cru...
In the world of Site Reliability Engineering (SRE), logging and log analysis play a critical role in ensuring reliable and performant systems. However, colle...
Are you looking for an easy way to compare and find alternatives of different cloud services across AWS, Azure, and GCP? Look no further than a GitHub reposi...
In today’s #100daysofSRE post, we’ll be exploring the key differences between Grafana and Splunk, two of the most popular tools for monitoring system and app...
In Day 9 of #100daysofSRE, we dive into the world of monitoring and observability in SRE. Learn how to improve the reliability and performance of your system...
Root cause analysis (RCA) and post-incident reviews (PIR) are critical processes for site reliability engineers (SREs) to improve the reliability and resilie...
In this post, I’ll be discussing the importance of effective communication during incidents in order to improve incident response in Site Reliability Enginee...
In Day 6 of #100daysofSRE, we’ll dive into the critical role of incident management and response in Site Reliability Engineering (SRE). We’ll explore the bes...
In the fifth post of #100daysofSRE series, we will discuss how automation benefits Site Reliability Engineering (SRE) and how automation techniques and tools...
Welcome to Day 4 of #100daysofSRE! Today, I’ll be discussing Chaos Engineering and its role in Site Reliability Engineering. Chaos Engineering is a practice ...
In Site Reliability Engineering (SRE), metrics play a vital role in measuring the reliability of a system. Three key metrics in this regard are Service Level...
Site Reliability Engineering (SRE) is a relatively new field that has gained tremendous popularity in recent years. It was first introduced by Google in 2003...
Site Reliability Engineering (SRE) is a discipline that emerged from Google’s need to manage the massive scale of their infrastructure. It’s a cross-function...
Managing and automating scripts on Linux systems is crucial for ensuring smooth operations. One effective solution for this is Supervisor, which is a powerfu...
awk
Command: Basic and Templates
awk is a versatile tool that can be used to search, filter, and manipulate text files, making it a go-to tool for site reliability engineers. In this blog po...
In site reliability engineering, log analysis is a crucial aspect of maintaining system availability and identifying potential issues. However, analyzing log...
Your blog post excerpt
In SRE, performance optimization and tuning are crucial for ensuring systems can quickly handle expected workloads and respond to user requests. This involve...
High availability and redundancy are critical components of any successful data management strategy. In Site Reliability Engineering (SRE), ensuring the avai...
Disaster recovery planning is a critical aspect of SRE that involves preparing for and mitigating the impact of catastrophic events that could disrupt your s...
In Day 14 of #100daysofSRE, we dive into the world of load testing and stress testing in Site Reliability Engineering (SRE). Load testing and stress testing ...
In this post, I’ll dive into capacity planning and management in SRE, including its importance, techniques, tools, and best practices. I’ll also explore capa...
In this blog post, I’ll dive into the topic of alerting and notification strategies for Site Reliability Engineering (SRE). Alerting and notification are cru...
In the world of Site Reliability Engineering (SRE), logging and log analysis play a critical role in ensuring reliable and performant systems. However, colle...
Are you looking for an easy way to compare and find alternatives of different cloud services across AWS, Azure, and GCP? Look no further than a GitHub reposi...
In today’s #100daysofSRE post, we’ll be exploring the key differences between Grafana and Splunk, two of the most popular tools for monitoring system and app...
In Day 9 of #100daysofSRE, we dive into the world of monitoring and observability in SRE. Learn how to improve the reliability and performance of your system...
Root cause analysis (RCA) and post-incident reviews (PIR) are critical processes for site reliability engineers (SREs) to improve the reliability and resilie...
In this post, I’ll be discussing the importance of effective communication during incidents in order to improve incident response in Site Reliability Enginee...
In Day 6 of #100daysofSRE, we’ll dive into the critical role of incident management and response in Site Reliability Engineering (SRE). We’ll explore the bes...
In the fifth post of #100daysofSRE series, we will discuss how automation benefits Site Reliability Engineering (SRE) and how automation techniques and tools...
Welcome to Day 4 of #100daysofSRE! Today, I’ll be discussing Chaos Engineering and its role in Site Reliability Engineering. Chaos Engineering is a practice ...
In Site Reliability Engineering (SRE), metrics play a vital role in measuring the reliability of a system. Three key metrics in this regard are Service Level...
Site Reliability Engineering (SRE) is a relatively new field that has gained tremendous popularity in recent years. It was first introduced by Google in 2003...
Site Reliability Engineering (SRE) is a discipline that emerged from Google’s need to manage the massive scale of their infrastructure. It’s a cross-function...
YubiKey is a small, portable hardware-based security key that adds an extra layer of protection to our online accounts. It is a two-factor authentication (2F...
If you’re looking to create high-quality videos, having the right equipment is essential. In this post, I’ll share the devices I use to capture my videos, in...
Are you tired of manually removing the ACM sigconf template’s copyright information from your research papers or latex documents like reports or homeworks? T...
Learn about the difference between symmetric and asymmetric key cryptography in Python with this tutorial. Discover how to use cryptographic algorithms in py...
The integration of language models is transforming the world of search engines and advertising. In this insightful article, I attempt to explore the ways in ...
Learn how to build a RESTful API in Python using Flask and PostgreSQL. In this tutorial, you’ll learn how to connect Flask to a PostgreSQL database and creat...
Learn how to exploit ARM-based systems with Raspberry Pi using Return Oriented Programming (ROP) techniques. This beginner-friendly guide will introduce you ...
In this blog post, we will discuss ARM exploitation techniques using Raspberry Pi and focus on Return-to-Libc exploitation, which is a common technique used ...
In this blog post, I will introduce you to ARM exploitation with Raspberry Pi and discuss how to return back to a program without crashing. We will be explor...
Are you interested in ARM exploitation with a Raspberry Pi? In this tutorial, I’ll cover the basics of stack overflow attacks on ARM architecture. You’ll lea...
Setting up your lab for ARM exploitation with Raspberry Pi requires a few steps to ensure that everything runs smoothly. In this blog post, I will provide a ...
In this tutorial, I’ll show you how to install Raspbian OS in Raspberry Pi without using a keyboard and monitor. This method is useful when you don’t have ac...
If you’re into exploit development, you’ve probably heard of Return Oriented Programming (ROP). ROP gadgets are small code snippets that can be chained toget...
Have you ever wanted to create your own cloud service, but didn’t want to pay for a subscription or worry about privacy concerns? Look no further than buildi...
MITRE ATT&CK is an essential tool for any organization who are concerned about cybersecurity, especially threat intelligence and threat modeling. In this...
In this blog post, we will guide you on how to launch an Amazon Web Service (AWS) Elastic Compute Cloud (EC2) instance. AWS EC2 is a popular cloud computing ...
If you’re looking to create high-quality videos, having the right equipment is essential. In this post, I’ll share the devices I use to capture my videos, in...
If you’re running a Jekyll static site or a blog using the Minimal Mistakes theme, you may be wondering how to incorporate Google Adsense to monetize your si...
Adversarial reconnaissance techniques are becoming increasingly sophisticated and challenging to mitigate, making them a major threat to the organizations. I...
The integration of language models is transforming the world of search engines and advertising. In this insightful article, I attempt to explore the ways in ...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
Hash tables are one of the most efficient data structures for storing and retrieving data. In this post, I will discuss the concept of hash tables and how th...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
In this blog post, we will guide you on how to launch an Amazon Web Service (AWS) Elastic Compute Cloud (EC2) instance. AWS EC2 is a popular cloud computing ...
With the increasing sophistication of cyber threats and the growing amount of data generated by organizations, data analytics has become an essential tool fo...
Want to improve the performance of your PostgreSQL database? In this post, I will discuss how to monitor and analyze the performance of your PostgreSQL datab...
Want to track the performance of your Minimal Mistakes blog? Google Analytics is a powerful tool that can help you to measure your website’s traffic, engagem...
Building a mobile app in Python has never been easier with the Kivy framework. This open-source Python library allows developers to create beautiful and func...
If you are looking for a fun and exciting way to get outside and explore nature, mountain biking (MTB) is the perfect activity. Anthills Hike and Bike Trail ...
Researching and publishing an article in a particular field requires a certain set of skills and knowledge. This blog post provides a step-by-step guide on h...
As language models become more prevalent, the importance of strong conversational skills has become essential. In this thought-provoking article, I explore w...
The integration of language models is transforming the world of search engines and advertising. In this insightful article, I attempt to explore the ways in ...
Reinforcement Learning is an exciting and powerful technique used in artificial intelligence and machine learning. In this tutorial, we will dive into Q-Lear...
In this second part of our Reinforcement Learning series, we will introduce you to some of the fundamental glossaries and concepts that you need to know befo...
Reinforcement learning is a subfield of machine learning that focuses on training agents to make sequential decisions in an environment. In this introductory...
Overleaf has been the mostly used cloud-based Latex editor that features collaboration and provides numerous templates across different criteria. Today I fou...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
Looking for an exciting day-long tour in Austin? Look no further! This article covers a variety of outdoor activities that will take you on a hiking, biking,...
Cyber security threats are on the rise, and everyone is vulnerable to attacks. Whether you are an individual, a business owner, or a government agency, it is...
Live Updates Worldwide Statistics Worldometers Coronavirus Live Update Johns Hopkins University Covid-19 World Map
Backdoors are one of the most common types of malware used by hackers to gain access to a target system. In this tutorial, I will teach you how to write a si...
Have you ever wanted to create your own cloud service, but didn’t want to pay for a subscription or worry about privacy concerns? Look no further than buildi...
Have you ever wanted to create your own cloud service, but didn’t want to pay for a subscription or worry about privacy concerns? Look no further than buildi...
Are you a student in Bangladesh who’s looking for opportunities to travel abroad? The Bangladesh-Sweden Trust Fund for Research and Development (BSTF) offers...
Are you a student in Bangladesh who’s looking for opportunities to travel abroad? The Bangladesh-Sweden Trust Fund for Research and Development (BSTF) offers...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
Are you tired of manually copying and pasting data from a Medium blog post? In this tutorial, we will learn how to extract the necessary contents from a Medi...
Cyber security threats are on the rise, and everyone is vulnerable to attacks. Whether you are an individual, a business owner, or a government agency, it is...
Are you living in the USA and looking to improve your credit score or establish a credit history? In this blog post, I’ll explore the recommended credit jour...
Managing finances can be challenging for anyone, but as an international student studying in the USA, it can be particularly daunting. In this blog post, I’l...
Bibliography management is an essential aspect of academic writing, particularly when you have to reference a large number of sources. Bibtex is a widely-use...
Explore the Chisos Basin Mountains of the Big Bend National Park in Texas in Part 02 of our road trip series from Houston. Get tips on hiking trails, wildlif...
In this post, I will take you through the first part of our journey exploring Santa Elena Canyon, one of the park’s most stunning natural wonders. It is loca...
If you are looking for a fun and exciting way to get outside and explore nature, mountain biking (MTB) is the perfect activity. Anthills Hike and Bike Trail ...
Discover the beauty of Martin Dies, Jr. State Park located in Jasper, TX, where camping and biking enthusiasts can experience the great outdoors. With its hu...
As language models become more prevalent, the importance of strong conversational skills has become essential. In this thought-provoking article, I explore w...
The integration of language models is transforming the world of search engines and advertising. In this insightful article, I attempt to explore the ways in ...
Join me on a journey with ‘Digital Nomad Goals’ where we build a community of travel enthusiasts and digital nomads! Let’s dive into a collection of travel d...
If you’re running a Jekyll static site or a blog using the Minimal Mistakes theme, you may be wondering how to incorporate Google Adsense to monetize your si...
Want to track the performance of your Minimal Mistakes blog? Google Analytics is a powerful tool that can help you to measure your website’s traffic, engagem...
In this tutorial, you will learn how to install Jekyll, a simple static site generator, on macOS and use the popular Minimal Mistakes theme to create a clean...
Looking for a cheat sheet to improve your Jekyll-based blog using the Minimal Mistakes theme? In this blog post, I share some code snippets that I use to enh...
Looking for a comprehensive collection of Cyber Security resources in Python? From books to codes and everything in between that are available on GitHub, thi...
Are you searching for a stunning and free Bootstrap template to showcase your personal portfolio or website? Bootstrap is a powerful and widely-used framewor...
Password cracking is an essential skill for ethical hackers and security researchers. One of the most straightforward ways to crack a password is by using a ...
Learn how to exploit ARM-based systems with Raspberry Pi using Return Oriented Programming (ROP) techniques. This beginner-friendly guide will introduce you ...
In this blog post, we will discuss ARM exploitation techniques using Raspberry Pi and focus on Return-to-Libc exploitation, which is a common technique used ...
In this blog post, I will introduce you to ARM exploitation with Raspberry Pi and discuss how to return back to a program without crashing. We will be explor...
Are you interested in ARM exploitation with a Raspberry Pi? In this tutorial, I’ll cover the basics of stack overflow attacks on ARM architecture. You’ll lea...
Setting up your lab for ARM exploitation with Raspberry Pi requires a few steps to ensure that everything runs smoothly. In this blog post, I will provide a ...
If you’re into exploit development, you’ve probably heard of Return Oriented Programming (ROP). ROP gadgets are small code snippets that can be chained toget...
Learn how to scrape data from Medium.com blogs by clicking the ‘Show More’ button multiple times using Selenium in Python. This tutorial covers step-by-step ...
In the following, I list some useful GitHub repositories related to the security certification exam Certified Ethical Hacker (CEH).
As an international student in the USA, applying for an internship or co-op can be an overwhelming process, especially if you are not familiar with the visa ...
If you’re interested in learning how to analyze vulnerable code, you’ll want to check out this tutorial series by Harsh Bothra. In the series, he covers vari...
Nowadays, graduate students are focusing on preparing better CV/Resume templates in Latex rather than preparing one in other word processing tools.
Discover the beauty of Martin Dies, Jr. State Park located in Jasper, TX, where camping and biking enthusiasts can experience the great outdoors. With its hu...
Planning a camping trip? Don’t forget to pack all the essentials with this comprehensive camping checklist. From shelter and bedding to cooking equipment and...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
If you’re looking to start or improve your blogging game, it’s important to have the right tools and platforms at your disposal. From content creation to web...
In this post, I will take you through the first part of our journey exploring Santa Elena Canyon, one of the park’s most stunning natural wonders. It is loca...
Are you looking for a book that can help you become more productive and successful in your personal and professional life? Look no further than, The 7 Habits...
OpenStack is a popular cloud computing platform that allows users to manage large pools of storage, compute, and networking resources. If you’re looking to i...
If you need to create line plots from a CSV file, LaTeX TikZ and PGFPlot offer powerful tools to help you achieve this task with ease. In this blog post, I’l...
If you are a researcher or a student looking for a way to create high-quality line plots for your scientific documents, then you might want to consider using...
In this tutorial, we’ll learn how to create beautiful bar charts using the PGFPlots package in Latex. Bar charts are useful for representing discrete data wi...
Bar charts are one of the most commonly used visualizations in data science. They are great for displaying categorical data and comparing values between diff...
The integration of language models is transforming the world of search engines and advertising. In this insightful article, I attempt to explore the ways in ...
Looking for a cheat sheet to improve your Jekyll-based blog using the Minimal Mistakes theme? In this blog post, I share some code snippets that I use to enh...
Python is a powerful and versatile programming language that is widely used in a variety of fields, including data science, machine learning, web development...
Explore the Chisos Basin Mountains of the Big Bend National Park in Texas in Part 02 of our road trip series from Houston. Get tips on hiking trails, wildlif...
In this post, we will introduce you to deep learning in Python using Keras and Tensorflow with the popular MNIST dataset. We will walk you through the steps ...
Are you struggling with classifying multiple types of objects in your machine learning project? This can be a challenging task, especially when working with ...
If you’re looking for some inspiration and motivation to conquer your own personal mountains, then watching mountain climbing documentaries is a great way to...
Desktop as a Service (DaaS) is the latest trend in cloud computing, providing users with virtual desktop environments that can be accessed from anywhere, at ...
Looking for a comprehensive collection of Cyber Security resources in Python? From books to codes and everything in between that are available on GitHub, thi...
listings
package for code documentation
If you’re writing a document that requires code snippets, you’ll need to use a package that supports code formatting in LaTeX. One such package is listings. ...
Cracking the coding interview is a crucial step in landing our dream tech job. My blog post covers some useful coding interview resources, including source o...
Overleaf is a popular web-based platform for writing and collaborating on LaTeX documents. The platform is widely used extensively in the academic communitie...
Nowadays, graduate students are focusing on preparing better CV/Resume templates in Latex rather than preparing one in other word processing tools.
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
Join me as I embark on a journey to explore the stunning state of Colorado. In this travel blog post, I will take you through my tour plans for Day 01 and sh...
In this tutorial, you’ll learn how to convert PCAP files to CSV format for network traffic analysis using Python. You’ll see how to use the tshark library to...
In this tutorial series, we have been exploring the implementation of a reverse proxy server in Python. In Part 4, we will create a shell script for automati...
In this third part of the, Write a Reverse Proxy Server in Python, series, we’ll cover the client-side script implementation. The client-side script is the s...
In this second part of our, Write a Reverse Proxy Server in Python, tutorial series, we will be discussing how to create a server pool to handle requests. By...
In this tutorial, you will learn how to write a reverse proxy server in Python. Reverse proxies are used to distribute traffic across multiple servers or to ...
Are you tired of your IP address changing every time you restart your Linux/Raspbian OS? Setting up a static IP address can make your life much easier! In th...
This post presents the summary of a few concept papers of Natural Language Processing
If you’re new to Data Science or just looking for a better setup for your work environment, then this post is for you. In this tutorial, I will guide you on ...
In research/development testbeds, there is often a need to connect multiple local area networks together. One way to achieve this is by using a Raspberry Pi ...
In this post, we will introduce you to deep learning in Python using Keras and Tensorflow with the popular MNIST dataset. We will walk you through the steps ...
Live Updates Worldwide Statistics Worldometers Coronavirus Live Update Johns Hopkins University Covid-19 World Map
Discover the beautiful sea beaches of Corpus Christi, Texas! From the soft white sands of Whitecap Beach to the awesome dunes of Mustang Island and the famil...
Live Updates Worldwide Statistics Worldometers Coronavirus Live Update Johns Hopkins University Covid-19 World Map
Adversarial reconnaissance techniques are becoming increasingly sophisticated and challenging to mitigate, making them a major threat to the organizations. I...
Adversarial reconnaissance techniques are becoming increasingly sophisticated and challenging to mitigate, making them a major threat to the organizations. I...
In today’s digital age, game theory is becoming an essential tool for understanding cyber security. Game theory allows security professionals to model the in...
Cyber security threats are on the rise, and everyone is vulnerable to attacks. Whether you are an individual, a business owner, or a government agency, it is...
Looking for a comprehensive collection of Cyber Security resources in Python? From books to codes and everything in between that are available on GitHub, thi...
If you are looking for a fun and exciting way to get outside and explore nature, mountain biking (MTB) is the perfect activity. Anthills Hike and Bike Trail ...
Discover the most popular parks in Houston for walking, running, and biking. Whether you are looking for a peaceful stroll, a scenic bike ride, or a challeng...
Escape the Houston city and explore the beauty of nature at Huntsville State Park located near Houston. In this post, I add some guidelines to hiking and bik...
Discover the fascinating surrounding of the Fort Travis Historic Site at Port Bolivar Texas through a drone shot. This post provides you on a journey in bird...
If you’re looking to create high-quality videos, having the right equipment is essential. In this post, I’ll share the devices I use to capture my videos, in...
If you’re interested in learning web application vulnerabilities, installing Damn Vulnerable Web Application (DVWA) is a great way to get started. DVWA is a ...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
Desktop as a Service (DaaS) is the latest trend in cloud computing, providing users with virtual desktop environments that can be accessed from anywhere, at ...
Learn how to create a powerful Grafana dashboard to present your device analysis with individual panels. In this tutorial, we will guide you step-by-step on ...
In this tutorial, I will show you how to select multiple options from a drop-down menu/filter (Query Variable) in Grafana based on a PostgreSQL table column....
Learn how to create a dashboard on Grafana that displays the status of a set of IoT devices by fetching data from PostGreSQL table. Monitor your devices in r...
I have been managing the backend of an IoT project to handle data and show statuses via Grafana dashboard. In this tutorial, I write a step-by-step tutorial ...
With the increasing sophistication of cyber threats and the growing amount of data generated by organizations, data analytics has become an essential tool fo...
Python Faker Module enables us to generate realistic-looking fake data for ensuring data privacy by masking sensitive data with fake data. In this blog post,...
Python Faker Module enables us to generate realistic-looking fake data for ensuring data privacy by masking sensitive data with fake data. In this blog post,...
Python Faker Module enables us to generate realistic-looking fake data for ensuring data privacy by masking sensitive data with fake data. In this blog post,...
Data Science in Python
Posts in my Blog
This post provides all the links of posts related to data science in python.
This post includes code snippets for drawing different stylish plots using the Seaborn Module
This post includes code snippets for drawing bar, pie, box, scatter plots, and histograms.
This post explains the basic syntax of matplotlib module for data visualization.
In the previous post, we have seen some basic usages of the pandas module. In this post, we will take a look at some more useful functionalities of the modul...
pandas is the mostly used module while analyzing data from a CSV, JSON, or Excel as the module can convert these data into dataframes and helps to analyze th...
Numpy is a popular python module that provides fast and efficient operations on n-dimensional arrays of homogeneous data. It has variety of functions that ca...
If you’re new to Data Science or just looking for a better setup for your work environment, then this post is for you. In this tutorial, I will guide you on ...
Hash tables are one of the most efficient data structures for storing and retrieving data. In this post, I will discuss the concept of hash tables and how th...
Want to improve the performance of your PostgreSQL database? In this post, I will discuss how to monitor and analyze the performance of your PostgreSQL datab...
Logging is a critical component of any Python project, and here, I write a simple tutorial and example templates to use that will help you to have a head sta...
In this post, we will introduce you to deep learning in Python using Keras and Tensorflow with the popular MNIST dataset. We will walk you through the steps ...
In this post, we will introduce you to deep learning in Python using Keras and Tensorflow with the popular MNIST dataset. We will walk you through the steps ...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
Join me as I embark on a journey to explore the stunning state of Colorado. In this travel blog post, I will take you through my tour plans for Day 01 and sh...
DevOps is a software development approach that aims to bridge the gap between development and operations teams, ensuring faster and more efficient delivery o...
DevOps is a software development approach that aims to bridge the gap between development and operations teams, ensuring faster and more efficient delivery o...
Hash tables are one of the most efficient data structures for storing and retrieving data. In this post, I will discuss the concept of hash tables and how th...
Password cracking is an essential skill for ethical hackers and security researchers. One of the most straightforward ways to crack a password is by using a ...
Join me on a journey with ‘Digital Nomad Goals’ where we build a community of travel enthusiasts and digital nomads! Let’s dive into a collection of travel d...
Writing a thesis or dissertation can be daunting in Latex, especially when it comes to formatting, including tables and algorithms or subfigures. Fortunately...
helloworld
App
If you are new to web development, Django can be a great starting point for building robust web applications. In this tutorial, you will learn the basics of ...
If you’re looking for some inspiration and motivation to conquer your own personal mountains, then watching mountain climbing documentaries is a great way to...
Overleaf is a popular web-based platform for writing and collaborating on LaTeX documents. The platform is widely used extensively in the academic communitie...
If you’re writing mathematical documents, Latex is a great tool for creating professional-looking equations and symbols. However, it can be overwhelming to u...
Bibliography management is an essential aspect of academic writing, particularly when you have to reference a large number of sources. Bibtex is a widely-use...
Creating a taxonomy tree is essential for scientific research papers, dissertations, or reports. A well-organized taxonomy tree provides a comprehensive and ...
If you are a researcher or a student looking for a way to create high-quality line plots for your scientific documents, then you might want to consider using...
If you are a beginner in LaTeX or even an experienced user, you might find it difficult to keep track of all the resources available out there. This blog pos...
Tables are a vital component of scientific documentation and publishing, and it’s essential to create them with precision and care. In this post, we’ll explo...
In this tutorial, we’ll learn how to create beautiful bar charts using the PGFPlots package in Latex. Bar charts are useful for representing discrete data wi...
As an author or scientific content writer, you need tools that can help you to write, edit and publish content with ease. Cloud-based tools offer several adv...
If you’re looking to create high-quality videos, having the right equipment is essential. In this post, I’ll share the devices I use to capture my videos, in...
In this blog post, we will guide you on how to launch an Amazon Web Service (AWS) Elastic Compute Cloud (EC2) instance. AWS EC2 is a popular cloud computing ...
This post introduces the security solutions for Enterprise Systems. I discuss the basic functionalities and key differences among SIEM, EDR, and SOAR.
Join me as I embark on a journey to explore the stunning state of Colorado. In this travel blog post, I will take you through my tour plans for Day 01 and sh...
If you’re looking to create professional-looking equations with clear parameter descriptions, then using Tikz in Latex can be a great solution. In this tutor...
Cyber deception is a technique used to detect and mitigate cybersecurity threats. Honeypots are an essential component of cyber deception, as they are design...
If you’re looking to start or improve your blogging game, it’s important to have the right tools and platforms at your disposal. From content creation to web...
Learn how to exploit ARM-based systems with Raspberry Pi using Return Oriented Programming (ROP) techniques. This beginner-friendly guide will introduce you ...
In this blog post, we will discuss ARM exploitation techniques using Raspberry Pi and focus on Return-to-Libc exploitation, which is a common technique used ...
In this blog post, I will introduce you to ARM exploitation with Raspberry Pi and discuss how to return back to a program without crashing. We will be explor...
Are you interested in ARM exploitation with a Raspberry Pi? In this tutorial, I’ll cover the basics of stack overflow attacks on ARM architecture. You’ll lea...
Setting up your lab for ARM exploitation with Raspberry Pi requires a few steps to ensure that everything runs smoothly. In this blog post, I will provide a ...
If you’re into exploit development, you’ve probably heard of Return Oriented Programming (ROP). ROP gadgets are small code snippets that can be chained toget...
Are you planning to move to Houston from the Indian Sub-continent? There are a few things that you should know before moving to Houston. Read on to learn abo...
Are you looking to integrate Facebook comments on your Jekyll blog? This blog post will guide you through the steps required to enable Facebook comments plug...
Python Faker Module enables us to generate realistic-looking fake data for ensuring data privacy by masking sensitive data with fake data. In this blog post,...
Have you ever wondered how viruses work? What if you could learn about viruses by writing your own simple, harmless virus in Python? In this blog post, I wil...
Operating System Fingerprinting is a process of identifying the type of operating system running on a remote machine by analyzing the packets captured on the...
Passive operating system fingerprinting is a critical skill for any network security professional. By analyzing PCAP files, it is possible to identify the op...
In this tutorial, you’ll learn how to convert PCAP files to CSV format for network traffic analysis using Python. You’ll see how to use the tshark library to...
Learn how to build a RESTful API in Python using Flask and PostgreSQL. In this tutorial, you’ll learn how to connect Flask to a PostgreSQL database and creat...
Hello World
App in 5 minutes
Looking for a quick and easy way to create your first web application using Flask? This beginner-friendly tutorial will guide you through the process of buil...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
Discover the fascinating surrounding of the Fort Travis Historic Site at Port Bolivar Texas through a drone shot. This post provides you on a journey in bird...
Hello World
App in 5 minutes
Looking for a quick and easy way to create your first web application using Flask? This beginner-friendly tutorial will guide you through the process of buil...
helloworld
App
If you are new to web development, Django can be a great starting point for building robust web applications. In this tutorial, you will learn the basics of ...
As language models become more prevalent, the importance of strong conversational skills has become essential. In this thought-provoking article, I explore w...
It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...
In today’s digital age, game theory is becoming an essential tool for understanding cyber security. Game theory allows security professionals to model the in...
In research/development testbeds, there is often a need to connect multiple local area networks together. One way to achieve this is by using a Raspberry Pi ...
Are you new to Git and Github and feeling overwhelmed by all the commands and features? This beginner’s guide is here to help you get started with the basics...
This post presents a generic .gitignore file that ignores Cached Code files and all Hidden Directories Recursively in a Git Repository
Learn how to download a specific subfolder or file from a Github repository without having to clone the entire repository. This post explains two easy method...
Are you new to Git and Github and feeling overwhelmed by all the commands and features? This beginner’s guide is here to help you get started with the basics...
In the following, I list some useful GitHub repositories related to the security certification exam Certified Ethical Hacker (CEH).
Setting up Git credentials is an essential step in securing your Git repository. However, you may encounter situations where you need to use different user c...
Are you new to Git and Github and feeling overwhelmed by all the commands and features? This beginner’s guide is here to help you get started with the basics...
This post presents a generic .gitignore file that ignores Cached Code files and all Hidden Directories Recursively in a Git Repository
Learn how to download a specific subfolder or file from a Github repository without having to clone the entire repository. This post explains two easy method...
If you’re looking to start or improve your blogging game, it’s important to have the right tools and platforms at your disposal. From content creation to web...
This post presents a generic .gitignore file that ignores Cached Code files and all Hidden Directories Recursively in a Git Repository
Are you new to Git and Github and feeling overwhelmed by all the commands and features? This beginner’s guide is here to help you get started with the basics...
This post presents a generic .gitignore file that ignores Cached Code files and all Hidden Directories Recursively in a Git Repository
This post presents the summary of a few concept papers of Natural Language Processing
As language models become more prevalent, the importance of strong conversational skills has become essential. In this thought-provoking article, I explore w...
The integration of language models is transforming the world of search engines and advertising. In this insightful article, I attempt to explore the ways in ...
Writing emails to professors can be a daunting task, especially when it comes to asking for a recommendation letter, inquiring about research opportunities, ...
Are you an international student who has just arrived in the USA for higher studies? Congratulations! Now that you’ve made it here, it’s time to get yourself...
Learn how to create a powerful Grafana dashboard to present your device analysis with individual panels. In this tutorial, we will guide you step-by-step on ...
In this tutorial, I will show you how to select multiple options from a drop-down menu/filter (Query Variable) in Grafana based on a PostgreSQL table column....
Learn how to create a dashboard on Grafana that displays the status of a set of IoT devices by fetching data from PostGreSQL table. Monitor your devices in r...
I have been managing the backend of an IoT project to handle data and show statuses via Grafana dashboard. In this tutorial, I write a step-by-step tutorial ...
If you need to create line plots from a CSV file, LaTeX TikZ and PGFPlot offer powerful tools to help you achieve this task with ease. In this blog post, I’l...
If you are a researcher or a student looking for a way to create high-quality line plots for your scientific documents, then you might want to consider using...
In this tutorial, we’ll learn how to create beautiful bar charts using the PGFPlots package in Latex. Bar charts are useful for representing discrete data wi...
Bar charts are one of the most commonly used visualizations in data science. They are great for displaying categorical data and comparing values between diff...
If you’ve recently installed Ubuntu on your Raspberry Pi, you might have encountered the black screen issue when booting up. This is a common problem with a ...
This post explains how to clone a website and then run in a docker container for testing and learning purpose
Are you looking for a book that can help you become more productive and successful in your personal and professional life? Look no further than, The 7 Habits...
Looking for an exciting day-long tour in Austin? Look no further! This article covers a variety of outdoor activities that will take you on a hiking, biking,...
Looking for a weekend getaway near Houston? Look no further than the San Jacinto Battleground and Huntsville Lake! Explore the historic site of the Battle of...
YubiKey is a small, portable hardware-based security key that adds an extra layer of protection to our online accounts. It is a two-factor authentication (2F...
Hash tables are one of the most efficient data structures for storing and retrieving data. In this post, I will discuss the concept of hash tables and how th...
Writing emails to professors can be a daunting task, especially when it comes to asking for a recommendation letter, inquiring about research opportunities, ...
Are you a student in Bangladesh who’s looking for opportunities to travel abroad? The Bangladesh-Sweden Trust Fund for Research and Development (BSTF) offers...
Are you an international student who has just arrived in the USA for higher studies? Congratulations! Now that you’ve made it here, it’s time to get yourself...
I got admitted as a Ph.D. student at the University of Houston, leaving for the USA this August. Here, I list the items to take to the USA as an internationa...
Escape the Houston city and explore the beauty of nature at Huntsville State Park located near Houston. In this post, I add some guidelines to hiking and bik...
Discover the fascinating surrounding of the Fort Travis Historic Site at Port Bolivar Texas through a drone shot. This post provides you on a journey in bird...
Cyber deception is a technique used to detect and mitigate cybersecurity threats. Honeypots are an essential component of cyber deception, as they are design...
Discover the most popular parks in Houston for walking, running, and biking. Whether you are looking for a peaceful stroll, a scenic bike ride, or a challeng...
Are you planning to move to Houston from the Indian Sub-continent? There are a few things that you should know before moving to Houston. Read on to learn abo...
Looking for a weekend getaway near Houston? Look no further than the San Jacinto Battleground and Huntsville Lake! Explore the historic site of the Battle of...
It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...
Adding a signature line and space in LaTeX is an essential part of writing formal documents such as letters, resumes, and contracts. In this tutorial, we wil...
Cyber deception is a technique used to detect and mitigate cybersecurity threats. Honeypots are an essential component of cyber deception, as they are design...
Escape the Houston city and explore the beauty of nature at Huntsville State Park located near Houston. In this post, I add some guidelines to hiking and bik...
Escape the Houston city and explore the beauty of nature at Huntsville State Park located near Houston. In this post, I add some guidelines to hiking and bik...
tikz
package causing error in IEEE Access template
If you are working on a LaTeX document using the IEEE Access template and have run into an error caused by the tikz package, you are not alone. In this blog ...
If you’re writing a research survey paper, a well-organized and properly formatted literature survey table is a must-have. A literature survey table summariz...
In the following, I list some useful GitHub repositories related to the security certification exam Certified Ethical Hacker (CEH).
This post introduces the security solutions for Enterprise Systems. I discuss the basic functionalities and key differences among SIEM, EDR, and SOAR.
Adversarial reconnaissance techniques are becoming increasingly sophisticated and challenging to mitigate, making them a major threat to the organizations. I...
In this tutorial, I’ll show you how to install Raspbian OS in Raspberry Pi without using a keyboard and monitor. This method is useful when you don’t have ac...
Have you ever wanted to create your own cloud service, but didn’t want to pay for a subscription or worry about privacy concerns? Look no further than buildi...
In this blog post, we will guide you on how to launch an Amazon Web Service (AWS) Elastic Compute Cloud (EC2) instance. AWS EC2 is a popular cloud computing ...
Reinforcement Learning is an exciting and powerful technique used in artificial intelligence and machine learning. In this tutorial, we will dive into Q-Lear...
In this second part of our Reinforcement Learning series, we will introduce you to some of the fundamental glossaries and concepts that you need to know befo...
Reinforcement learning is a subfield of machine learning that focuses on training agents to make sequential decisions in an environment. In this introductory...
As an international student in the USA, applying for an internship or co-op can be an overwhelming process, especially if you are not familiar with the visa ...
Are you planning to move to Houston from the Indian Sub-continent? There are a few things that you should know before moving to Houston. Read on to learn abo...
As an international student in the USA, applying for an internship or co-op can be an overwhelming process, especially if you are not familiar with the visa ...
Python is a powerful and versatile programming language that is widely used in a variety of fields, including data science, machine learning, web development...
Learn how to create a dashboard on Grafana that displays the status of a set of IoT devices by fetching data from PostGreSQL table. Monitor your devices in r...
Python itertools module is a powerful library to create fast and efficient iterators. It provides a set of functions for working with iterators and can be us...
This post introduces Javascript basic syntax to the Python Programmers in a few minutes
If you’re a Jekyll blogger and struggling with 404 errors on your blog website, there is a way to fix this issue. Broken links and missing pages can frustrat...
If you’re looking to start or improve your blogging game, it’s important to have the right tools and platforms at your disposal. From content creation to web...
Learn how to add LaTeX math equations to Jekyll-based theme Minimal Mistakes with just a few easy steps! This tutorial will guide you through the process, al...
In this tutorial, you will learn how to install Jekyll, a simple static site generator, on macOS and use the popular Minimal Mistakes theme to create a clean...
If you’re running a Jekyll static site or a blog using the Minimal Mistakes theme, you may be wondering how to incorporate Google Adsense to monetize your si...
Want to track the performance of your Minimal Mistakes blog? Google Analytics is a powerful tool that can help you to measure your website’s traffic, engagem...
Are you looking to integrate Facebook comments on your Jekyll blog? This blog post will guide you through the steps required to enable Facebook comments plug...
If you’re new to Data Science or just looking for a better setup for your work environment, then this post is for you. In this tutorial, I will guide you on ...
Learn how to set up headless Kali Linux in a Raspberry Pi 4 without the need for a monitor, keyboard, and mouse. This step-by-step guide will walk you throug...
Want to understand how keyloggers work? This blog post will guide you through writing a basic keylogger in Python. Keyloggers can be useful tools for monitor...
Want to understand how keyloggers work? This blog post will guide you through writing a basic keylogger in Python. Keyloggers can be useful tools for monitor...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
Join me as I embark on a journey to explore the stunning state of Colorado. In this travel blog post, I will take you through my tour plans for Day 01 and sh...
Building a mobile app in Python has never been easier with the Kivy framework. This open-source Python library allows developers to create beautiful and func...
Are you new to LaTeX and struggling to get the desired output for your document? You are not alone. Many new users make common mistakes that hinder their pro...
Learn how to easily convert your Python Matplotlib plots to LaTeX format using just a few lines of code. Latex plots are better in academic writings for conf...
Writing a thesis or dissertation can be daunting in Latex, especially when it comes to formatting, including tables and algorithms or subfigures. Fortunately...
Overleaf is a popular web-based platform for writing and collaborating on LaTeX documents. The platform is widely used extensively in the academic communitie...
Looking for a more professional-looking and publication-ready plot for your reports and research papers? Latex plots is the perfect solution for you. With it...
Want to plot multiple y-axes on a single LaTeX PGFPlots plot? Check out this tutorial on how to draw multiple y-axes in LaTeX PGFPlots. Whether you are a sci...
Overleaf has been the mostly used cloud-based Latex editor that features collaboration and provides numerous templates across different criteria. Today I fou...
In academic writing, a literature survey is an essential component for presenting a comprehensive review of a topic. A taxonomy tree can be used to visually ...
If you’re looking to create professional-looking equations with clear parameter descriptions, then using Tikz in Latex can be a great solution. In this tutor...
Collaborating with others on a writing project can be a challenge, especially when everyone is working on different parts of the document. Overleaf, a collab...
Learn how to add LaTeX math equations to Jekyll-based theme Minimal Mistakes with just a few easy steps! This tutorial will guide you through the process, al...
Recently, I was looking for a few one-page resume templates in Latex. Obviously, the best resource collection to start looking for is the Overleaf Template G...
Are you tired of manually removing the ACM sigconf template’s copyright information from your research papers or latex documents like reports or homeworks? T...
listings
package for code documentation
If you’re writing a document that requires code snippets, you’ll need to use a package that supports code formatting in LaTeX. One such package is listings. ...
Writing matrices with row/column labels is a common requirement in scientific and technical documents. LaTeX provides several ways to accomplish this, and in...
If you’re writing mathematical documents, Latex is a great tool for creating professional-looking equations and symbols. However, it can be overwhelming to u...
Adding a signature line and space in LaTeX is an essential part of writing formal documents such as letters, resumes, and contracts. In this tutorial, we wil...
If you need to create line plots from a CSV file, LaTeX TikZ and PGFPlot offer powerful tools to help you achieve this task with ease. In this blog post, I’l...
Bibliography management is an essential aspect of academic writing, particularly when you have to reference a large number of sources. Bibtex is a widely-use...
Nowadays, graduate students are focusing on preparing better CV/Resume templates in Latex rather than preparing one in other word processing tools.
Creating a taxonomy tree is essential for scientific research papers, dissertations, or reports. A well-organized taxonomy tree provides a comprehensive and ...
If you’re writing a research survey paper, a well-organized and properly formatted literature survey table is a must-have. A literature survey table summariz...
tikz
package causing error in IEEE Access template
If you are working on a LaTeX document using the IEEE Access template and have run into an error caused by the tikz package, you are not alone. In this blog ...
If you are a researcher or a student looking for a way to create high-quality line plots for your scientific documents, then you might want to consider using...
If you are a beginner in LaTeX or even an experienced user, you might find it difficult to keep track of all the resources available out there. This blog pos...
Tables are a vital component of scientific documentation and publishing, and it’s essential to create them with precision and care. In this post, we’ll explo...
In this tutorial, we’ll learn how to create beautiful bar charts using the PGFPlots package in Latex. Bar charts are useful for representing discrete data wi...
Learn how to make lists in Latex using the itemize, enumerate, and to-do-list environments. These are essential tools for organizing and presenting informati...
If you’re using the IEEE conference format to submit your research paper, you may want to add a copyright notice and conference name to your document. In thi...
Learn how to write algorithms in Latex using the algorithmicx package. This package provides an easy-to-use and flexible environment for writing algorithms w...
Subfigures in LaTeX are a great way to add multiple images to a document while maintaining proper placement and referencing. However, they can be a bit trick...
Are you planning to move to Houston from the Indian Sub-continent? There are a few things that you should know before moving to Houston. Read on to learn abo...
Installing a specific version of Linux header in a Raspberry Pi can be crucial for certain applications to work. However, it can be a tricky process if you a...
Are you struggling with Ubuntu’s automatic screen scaling issue while using VirtualBox? This can be a frustrating experience, but luckily, there’s a solution...
Are you a computer science student who just installed Ubuntu on your machine? Here are some essential things you should do to set up your development environ...
OpenStack is a popular cloud computing platform that allows users to manage large pools of storage, compute, and networking resources. If you’re looking to i...
A Security Information and Event Management (SIEM) system collects log data from various sources within an organization’s IT infrastructure. This data is use...
Logging is a critical component of any Python project, and here, I write a simple tutorial and example templates to use that will help you to have a head sta...
Join me as I embark on a journey to explore the stunning state of Colorado. In this travel blog post, I will take you through my tour plans for Day 01 and sh...
listings
package for code documentation
If you’re writing a document that requires code snippets, you’ll need to use a package that supports code formatting in LaTeX. One such package is listings. ...
MITRE ATT&CK is an essential tool for any organization who are concerned about cybersecurity, especially threat intelligence and threat modeling. In this...
Our latest preprint on Arxiv explores the practical use cases and applications of the MITRE ATT&CK framework in research and practice. This blog post sum...
This post includes code snippets for drawing different stylish plots using the Seaborn Module
This post includes code snippets for drawing bar, pie, box, scatter plots, and histograms.
This post explains the basic syntax of matplotlib module for data visualization.
In the previous post, we have seen some basic usages of the pandas module. In this post, we will take a look at some more useful functionalities of the modul...
pandas is the mostly used module while analyzing data from a CSV, JSON, or Excel as the module can convert these data into dataframes and helps to analyze th...
Numpy is a popular python module that provides fast and efficient operations on n-dimensional arrays of homogeneous data. It has variety of functions that ca...
In this post, we will introduce you to deep learning in Python using Keras and Tensorflow with the popular MNIST dataset. We will walk you through the steps ...
Are you struggling with classifying multiple types of objects in your machine learning project? This can be a challenging task, especially when working with ...
Writing a worm in Python can seem like a daunting task, but it’s an excellent way to learn about computer security and how these types of programs work. In t...
Backdoors are one of the most common types of malware used by hackers to gain access to a target system. In this tutorial, I will teach you how to write a si...
This post presents the summary of a few concept papers of Natural Language Processing
If you’re looking to start or improve your blogging game, it’s important to have the right tools and platforms at your disposal. From content creation to web...
Learn how to add LaTeX math equations to Jekyll-based theme Minimal Mistakes with just a few easy steps! This tutorial will guide you through the process, al...
The life stories of scientists and mathematicians have always fascinated people, and Hollywood has taken notice. Many movies have been made based on the live...
If you’re writing mathematical documents, Latex is a great tool for creating professional-looking equations and symbols. However, it can be overwhelming to u...
This post includes code snippets for drawing different stylish plots using the Seaborn Module
This post includes code snippets for drawing bar, pie, box, scatter plots, and histograms.
This post explains the basic syntax of matplotlib module for data visualization.
Numpy is a popular python module that provides fast and efficient operations on n-dimensional arrays of homogeneous data. It has variety of functions that ca...
Matplotlib is a powerful data visualization library in Python. It allows you to create a wide range of charts and graphs, including multiple axis charts with...
Learn how to scrape data from Medium.com blogs by clicking the ‘Show More’ button multiple times using Selenium in Python. This tutorial covers step-by-step ...
Are you tired of manually copying and pasting data from a Medium blog post? In this tutorial, we will learn how to extract the necessary contents from a Medi...
Cyber deception is a technique used to detect and mitigate cybersecurity threats. Honeypots are an essential component of cyber deception, as they are design...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
If you’re a Jekyll blogger and struggling with 404 errors on your blog website, there is a way to fix this issue. Broken links and missing pages can frustrat...
Learn how to add LaTeX math equations to Jekyll-based theme Minimal Mistakes with just a few easy steps! This tutorial will guide you through the process, al...
In this tutorial, you will learn how to install Jekyll, a simple static site generator, on macOS and use the popular Minimal Mistakes theme to create a clean...
Looking for a cheat sheet to improve your Jekyll-based blog using the Minimal Mistakes theme? In this blog post, I share some code snippets that I use to enh...
If you’re running a Jekyll static site or a blog using the Minimal Mistakes theme, you may be wondering how to incorporate Google Adsense to monetize your si...
Want to track the performance of your Minimal Mistakes blog? Google Analytics is a powerful tool that can help you to measure your website’s traffic, engagem...
Are you looking to integrate Facebook comments on your Jekyll blog? This blog post will guide you through the steps required to enable Facebook comments plug...
If you’re looking to start or improve your blogging game, it’s important to have the right tools and platforms at your disposal. From content creation to web...
Installation of Ryu Controller and Mininet
Are you new to LaTeX and struggling to get the desired output for your document? You are not alone. Many new users make common mistakes that hinder their pro...
Building a mobile app in Python has never been easier with the Kivy framework. This open-source Python library allows developers to create beautiful and func...
Learn how to create a powerful Grafana dashboard to present your device analysis with individual panels. In this tutorial, we will guide you step-by-step on ...
In this tutorial, I will show you how to select multiple options from a drop-down menu/filter (Query Variable) in Grafana based on a PostgreSQL table column....
Want to improve the performance of your PostgreSQL database? In this post, I will discuss how to monitor and analyze the performance of your PostgreSQL datab...
Learn how to create a dashboard on Grafana that displays the status of a set of IoT devices by fetching data from PostGreSQL table. Monitor your devices in r...
I have been managing the backend of an IoT project to handle data and show statuses via Grafana dashboard. In this tutorial, I write a step-by-step tutorial ...
Are you interested in setting up a live video monitoring system using a Raspberry Pi and any webcam? With this tutorial, you’ll learn how to set up a simple ...
Are you interested in setting up a live video monitoring system using a Raspberry Pi and any webcam? With this tutorial, you’ll learn how to set up a simple ...
Join me as I embark on a journey to explore the stunning state of Colorado. In this travel blog post, I will take you through my tour plans for Day 01 and sh...
If you are looking for a fun and exciting way to get outside and explore nature, mountain biking (MTB) is the perfect activity. Anthills Hike and Bike Trail ...
Discover the most popular parks in Houston for walking, running, and biking. Whether you are looking for a peaceful stroll, a scenic bike ride, or a challeng...
The life stories of scientists and mathematicians have always fascinated people, and Hollywood has taken notice. Many movies have been made based on the live...
If you’re looking for some inspiration and motivation to conquer your own personal mountains, then watching mountain climbing documentaries is a great way to...
Are you struggling with classifying multiple types of objects in your machine learning project? This can be a challenging task, especially when working with ...
YubiKey is a small, portable hardware-based security key that adds an extra layer of protection to our online accounts. It is a two-factor authentication (2F...
Discover the beautiful sea beaches of Corpus Christi, Texas! From the soft white sands of Whitecap Beach to the awesome dunes of Mustang Island and the famil...
If you’re working with VirtualBox, you may have encountered a situation where you need to access a guest machine via SSH. However, in the default NAT network...
This post presents the summary of a few concept papers of Natural Language Processing
Writing a thesis or dissertation can be daunting in Latex, especially when it comes to formatting, including tables and algorithms or subfigures. Fortunately...
In today’s digital age, game theory is becoming an essential tool for understanding cyber security. Game theory allows security professionals to model the in...
Explore the Chisos Basin Mountains of the Big Bend National Park in Texas in Part 02 of our road trip series from Houston. Get tips on hiking trails, wildlif...
In this post, I will take you through the first part of our journey exploring Santa Elena Canyon, one of the park’s most stunning natural wonders. It is loca...
This post presents the summary of a few concept papers of Natural Language Processing
In this post, we will introduce you to deep learning in Python using Keras and Tensorflow with the popular MNIST dataset. We will walk you through the steps ...
Live Updates Worldwide Statistics Worldometers Coronavirus Live Update Johns Hopkins University Covid-19 World Map
Discover the beautiful sea beaches of Corpus Christi, Texas! From the soft white sands of Whitecap Beach to the awesome dunes of Mustang Island and the famil...
Learn how to create beautiful group-plots in Python with this step-by-step guide. With examples using Matplotlib and Pandas, you can master the art of visual...
This post includes code snippets for drawing bar, pie, box, scatter plots, and histograms.
This post explains the basic syntax of matplotlib module for data visualization.
In the previous post, we have seen some basic usages of the pandas module. In this post, we will take a look at some more useful functionalities of the modul...
pandas is the mostly used module while analyzing data from a CSV, JSON, or Excel as the module can convert these data into dataframes and helps to analyze th...
Numpy is a popular python module that provides fast and efficient operations on n-dimensional arrays of homogeneous data. It has variety of functions that ca...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
Passive operating system fingerprinting is a critical skill for any network security professional. By analyzing PCAP files, it is possible to identify the op...
In this tutorial, you’ll learn how to convert PCAP files to CSV format for network traffic analysis using Python. You’ll see how to use the tshark library to...
Adversarial reconnaissance techniques are becoming increasingly sophisticated and challenging to mitigate, making them a major threat to the organizations. I...
OpenStack is a popular cloud computing platform that allows users to manage large pools of storage, compute, and networking resources. If you’re looking to i...
If you’re looking for some interesting and useful Python code snippets to use in your projects, look no further. In this blog post, we’ve compiled a list of ...
Configuring a Raspberry Pi as an OpenFlow switch (low cost open flow switch) can be a great way to set up your own network. However, the process can be compl...
OpenFlow is a popular networking protocol that allows for the centralized management and control of network devices such as switches and routers. With OpenFl...
OpenFlow is a popular networking protocol that allows for the centralized management and control of network devices such as switches and routers. With OpenFl...
Configuring a Raspberry Pi as an OpenFlow switch (low cost open flow switch) can be a great way to set up your own network. However, the process can be compl...
Operating System Fingerprinting is a process of identifying the type of operating system running on a remote machine by analyzing the packets captured on the...
Learn how to easily convert your Python Matplotlib plots to LaTeX format using just a few lines of code. Latex plots are better in academic writings for conf...
Looking for a more professional-looking and publication-ready plot for your reports and research papers? Latex plots is the perfect solution for you. With it...
Want to plot multiple y-axes on a single LaTeX PGFPlots plot? Check out this tutorial on how to draw multiple y-axes in LaTeX PGFPlots. Whether you are a sci...
Overleaf has been the mostly used cloud-based Latex editor that features collaboration and provides numerous templates across different criteria. Today I fou...
In academic writing, a literature survey is an essential component for presenting a comprehensive review of a topic. A taxonomy tree can be used to visually ...
If you’re looking to create professional-looking equations with clear parameter descriptions, then using Tikz in Latex can be a great solution. In this tutor...
Setting up Git credentials is an essential step in securing your Git repository. However, you may encounter situations where you need to use different user c...
Collaborating with others on a writing project can be a challenge, especially when everyone is working on different parts of the document. Overleaf, a collab...
Writing matrices with row/column labels is a common requirement in scientific and technical documents. LaTeX provides several ways to accomplish this, and in...
Want to plot multiple y-axes on a single LaTeX PGFPlots plot? Check out this tutorial on how to draw multiple y-axes in LaTeX PGFPlots. Whether you are a sci...
If you need to create line plots from a CSV file, LaTeX TikZ and PGFPlot offer powerful tools to help you achieve this task with ease. In this blog post, I’l...
Root cause analysis (RCA) and post-incident reviews (PIR) are critical processes for site reliability engineers (SREs) to improve the reliability and resilie...
Learn how to create beautiful group-plots in Python with this step-by-step guide. With examples using Matplotlib and Pandas, you can master the art of visual...
This post includes code snippets for drawing bar, pie, box, scatter plots, and histograms.
This post explains the basic syntax of matplotlib module for data visualization.
In the previous post, we have seen some basic usages of the pandas module. In this post, we will take a look at some more useful functionalities of the modul...
pandas is the mostly used module while analyzing data from a CSV, JSON, or Excel as the module can convert these data into dataframes and helps to analyze th...
Numpy is a popular python module that provides fast and efficient operations on n-dimensional arrays of homogeneous data. It has variety of functions that ca...
Matplotlib is a powerful data visualization library in Python. It allows you to create a wide range of charts and graphs, including multiple axis charts with...
Live Updates Worldwide Statistics Worldometers Coronavirus Live Update Johns Hopkins University Covid-19 World Map
Adversarial reconnaissance techniques are becoming increasingly sophisticated and challenging to mitigate, making them a major threat to the organizations. I...
Desktop as a Service (DaaS) is the latest trend in cloud computing, providing users with virtual desktop environments that can be accessed from anywhere, at ...
Passive operating system fingerprinting is a critical skill for any network security professional. By analyzing PCAP files, it is possible to identify the op...
In this tutorial, you’ll learn how to convert PCAP files to CSV format for network traffic analysis using Python. You’ll see how to use the tshark library to...
Cyber security threats are on the rise, and everyone is vulnerable to attacks. Whether you are an individual, a business owner, or a government agency, it is...
Password cracking is an essential skill for ethical hackers and security researchers. One of the most straightforward ways to crack a password is by using a ...
Learn how to set up headless Kali Linux in a Raspberry Pi 4 without the need for a monitor, keyboard, and mouse. This step-by-step guide will walk you throug...
Cyber security threats are on the rise, and everyone is vulnerable to attacks. Whether you are an individual, a business owner, or a government agency, it is...
Writing emails to professors can be a daunting task, especially when it comes to asking for a recommendation letter, inquiring about research opportunities, ...
Are you an international student who has just arrived in the USA for higher studies? Congratulations! Now that you’ve made it here, it’s time to get yourself...
Discover the fascinating surrounding of the Fort Travis Historic Site at Port Bolivar Texas through a drone shot. This post provides you on a journey in bird...
Are you searching for a stunning and free Bootstrap template to showcase your personal portfolio or website? Bootstrap is a powerful and widely-used framewor...
Learn how to create a dashboard on Grafana that displays the status of a set of IoT devices by fetching data from PostGreSQL table. Monitor your devices in r...
Learn how to create a powerful Grafana dashboard to present your device analysis with individual panels. In this tutorial, we will guide you step-by-step on ...
In this tutorial, I will show you how to select multiple options from a drop-down menu/filter (Query Variable) in Grafana based on a PostgreSQL table column....
Want to improve the performance of your PostgreSQL database? In this post, I will discuss how to monitor and analyze the performance of your PostgreSQL datab...
Learn how to boost the performance of your Python PostgreSQL database connections by using a connection pool. In this tutorial, I will go through the steps t...
I have been managing the backend of an IoT project to handle data and show statuses via Grafana dashboard. In this tutorial, I write a step-by-step tutorial ...
Are you looking for a book that can help you become more productive and successful in your personal and professional life? Look no further than, The 7 Habits...
If you’re looking for some interesting and useful Python code snippets to use in your projects, look no further. In this blog post, we’ve compiled a list of ...
Creating a taxonomy tree is essential for scientific research papers, dissertations, or reports. A well-organized taxonomy tree provides a comprehensive and ...
If you’re writing a research survey paper, a well-organized and properly formatted literature survey table is a must-have. A literature survey table summariz...
Researching and publishing an article in a particular field requires a certain set of skills and knowledge. This blog post provides a step-by-step guide on h...
Learn how to build a simple chat application using Python and the ZeroMQ module! Our step-by-step guide will teach you about publisher-subscriber messaging a...
Discover 30 Python code snippets that can save you valuable time and help you get your next project up and running quickly. These code snippets include time-...
Learn how to build a RESTful API in Python using Flask and PostgreSQL. In this tutorial, you’ll learn how to connect Flask to a PostgreSQL database and creat...
Learn how to boost the performance of your Python PostgreSQL database connections by using a connection pool. In this tutorial, I will go through the steps t...
Learn how to build a simple chat application using Python and the ZeroMQ module! Our step-by-step guide will teach you about publisher-subscriber messaging a...
Logging is a critical component of any Python project, and here, I write a simple tutorial and example templates to use that will help you to have a head sta...
Python Faker Module enables us to generate realistic-looking fake data for ensuring data privacy by masking sensitive data with fake data. In this blog post,...
Twitter is a popular source of data (tweets), but accessing the tweets can be a challenge. Previously I scraped data from Medium. In this tutorial, I write h...
Cracking the coding interview is a crucial step in landing our dream tech job. My blog post covers some useful coding interview resources, including source o...
Learn how to create beautiful group-plots in Python with this step-by-step guide. With examples using Matplotlib and Pandas, you can master the art of visual...
Learn about the difference between symmetric and asymmetric key cryptography in Python with this tutorial. Discover how to use cryptographic algorithms in py...
Learn how to scrape data from Medium.com blogs by clicking the ‘Show More’ button multiple times using Selenium in Python. This tutorial covers step-by-step ...
Are you tired of manually copying and pasting data from a Medium blog post? In this tutorial, we will learn how to extract the necessary contents from a Medi...
Looking for a comprehensive collection of Cyber Security resources in Python? From books to codes and everything in between that are available on GitHub, thi...
This post explains how to clone a website and then run in a docker container for testing and learning purpose
Building a mobile app in Python has never been easier with the Kivy framework. This open-source Python library allows developers to create beautiful and func...
Data Science in Python
Posts in my Blog
This post provides all the links of posts related to data science in python.
If you’re looking for some interesting and useful Python code snippets to use in your projects, look no further. In this blog post, we’ve compiled a list of ...
In this tutorial series, we have been exploring the implementation of a reverse proxy server in Python. In Part 4, we will create a shell script for automati...
In this third part of the, Write a Reverse Proxy Server in Python, series, we’ll cover the client-side script implementation. The client-side script is the s...
In this second part of our, Write a Reverse Proxy Server in Python, tutorial series, we will be discussing how to create a server pool to handle requests. By...
Writing a worm in Python can seem like a daunting task, but it’s an excellent way to learn about computer security and how these types of programs work. In t...
In this tutorial, you will learn how to write a reverse proxy server in Python. Reverse proxies are used to distribute traffic across multiple servers or to ...
Have you ever wondered how viruses work? What if you could learn about viruses by writing your own simple, harmless virus in Python? In this blog post, I wil...
Backdoors are one of the most common types of malware used by hackers to gain access to a target system. In this tutorial, I will teach you how to write a si...
Want to understand how keyloggers work? This blog post will guide you through writing a basic keylogger in Python. Keyloggers can be useful tools for monitor...
This post introduces Javascript basic syntax to the Python Programmers in a few minutes
Password cracking is an essential skill for ethical hackers and security researchers. One of the most straightforward ways to crack a password is by using a ...
Hash tables are one of the most efficient data structures for storing and retrieving data. In this post, I will discuss the concept of hash tables and how th...
qrcode
and opencv
module
QR codes are becoming increasingly popular in many applications, from tracking inventory to sharing contact information. In this post, we’ll explore how to c...
Python itertools module is a powerful library to create fast and efficient iterators. It provides a set of functions for working with iterators and can be us...
Learn how to detect objects from images and count them using Python! In this tutorial, we will show you how to use OpenCV and CVLib to perform object detecti...
Learn the basics of cryptography and explore the process of encryption and decryption using Python. This tutorial covers the essential concepts of symmetric-...
Learn about cryptographic hashes and message digests in Python, and how they are used to ensure the integrity of data. This blog post will cover the basics o...
Are you looking for some useful Python tips and tricks that can help you write better code? Look no further! In this post, we have compiled a list of some of...
This post includes code snippets for drawing different stylish plots using the Seaborn Module
This post includes code snippets for drawing bar, pie, box, scatter plots, and histograms.
This post explains the basic syntax of matplotlib module for data visualization.
In the previous post, we have seen some basic usages of the pandas module. In this post, we will take a look at some more useful functionalities of the modul...
pandas is the mostly used module while analyzing data from a CSV, JSON, or Excel as the module can convert these data into dataframes and helps to analyze th...
Numpy is a popular python module that provides fast and efficient operations on n-dimensional arrays of homogeneous data. It has variety of functions that ca...
Hello World
App in 5 minutes
Looking for a quick and easy way to create your first web application using Flask? This beginner-friendly tutorial will guide you through the process of buil...
helloworld
App
If you are new to web development, Django can be a great starting point for building robust web applications. In this tutorial, you will learn the basics of ...
Learn how to perform matrix operations like addition, subtraction, multiplication, inverse, transpose, and more using Python’s NumPy library. This tutorial w...
Matplotlib is a powerful data visualization library in Python. It allows you to create a wide range of charts and graphs, including multiple axis charts with...
Python is a powerful and versatile programming language that is widely used in a variety of fields, including data science, machine learning, web development...
If you’re new to Data Science or just looking for a better setup for your work environment, then this post is for you. In this tutorial, I will guide you on ...
Bar charts are one of the most commonly used visualizations in data science. They are great for displaying categorical data and comparing values between diff...
Have you ever wanted to create a simple chatting program in Python? Maybe for a small project or to learn about networking and communication protocols. Look ...
qrcode
and opencv
module
QR codes are becoming increasingly popular in many applications, from tracking inventory to sharing contact information. In this post, we’ll explore how to c...
If you’re new to Data Science or just looking for a better setup for your work environment, then this post is for you. In this tutorial, I will guide you on ...
Root cause analysis (RCA) and post-incident reviews (PIR) are critical processes for site reliability engineers (SREs) to improve the reliability and resilie...
Learn how to build a RESTful API in Python using Flask and PostgreSQL. In this tutorial, you’ll learn how to connect Flask to a PostgreSQL database and creat...
Learn about the difference between symmetric and asymmetric key cryptography in Python with this tutorial. Discover how to use cryptographic algorithms in py...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
Installing a specific version of Linux header in a Raspberry Pi can be crucial for certain applications to work. However, it can be a tricky process if you a...
In research/development testbeds, there is often a need to connect multiple local area networks together. One way to achieve this is by using a Raspberry Pi ...
Configuring a Raspberry Pi as an OpenFlow switch (low cost open flow switch) can be a great way to set up your own network. However, the process can be compl...
If you’ve recently installed Ubuntu on your Raspberry Pi, you might have encountered the black screen issue when booting up. This is a common problem with a ...
Learn how to set up headless Kali Linux in a Raspberry Pi 4 without the need for a monitor, keyboard, and mouse. This step-by-step guide will walk you throug...
Are you interested in setting up a live video monitoring system using a Raspberry Pi and any webcam? With this tutorial, you’ll learn how to set up a simple ...
Are you tired of your IP address changing every time you restart your Linux/Raspbian OS? Setting up a static IP address can make your life much easier! In th...
Learn how to exploit ARM-based systems with Raspberry Pi using Return Oriented Programming (ROP) techniques. This beginner-friendly guide will introduce you ...
In this blog post, we will discuss ARM exploitation techniques using Raspberry Pi and focus on Return-to-Libc exploitation, which is a common technique used ...
In this blog post, I will introduce you to ARM exploitation with Raspberry Pi and discuss how to return back to a program without crashing. We will be explor...
Are you interested in ARM exploitation with a Raspberry Pi? In this tutorial, I’ll cover the basics of stack overflow attacks on ARM architecture. You’ll lea...
In this tutorial, I’ll show you how to install Raspbian OS in Raspberry Pi without using a keyboard and monitor. This method is useful when you don’t have ac...
Have you ever wanted to create your own cloud service, but didn’t want to pay for a subscription or worry about privacy concerns? Look no further than buildi...
In this post, we will introduce you to deep learning in Python using Keras and Tensorflow with the popular MNIST dataset. We will walk you through the steps ...
OpenStack is a popular cloud computing platform that allows users to manage large pools of storage, compute, and networking resources. If you’re looking to i...
Are you new to LaTeX and struggling to get the desired output for your document? You are not alone. Many new users make common mistakes that hinder their pro...
Reinforcement Learning is an exciting and powerful technique used in artificial intelligence and machine learning. In this tutorial, we will dive into Q-Lear...
In this second part of our Reinforcement Learning series, we will introduce you to some of the fundamental glossaries and concepts that you need to know befo...
Reinforcement learning is a subfield of machine learning that focuses on training agents to make sequential decisions in an environment. In this introductory...
Are you tired of manually copying and pasting data from a Medium blog post? In this tutorial, we will learn how to extract the necessary contents from a Medi...
As an author or scientific content writer, you need tools that can help you to write, edit and publish content with ease. Cloud-based tools offer several adv...
Researching and publishing an article in a particular field requires a certain set of skills and knowledge. This blog post provides a step-by-step guide on h...
Overleaf has been the mostly used cloud-based Latex editor that features collaboration and provides numerous templates across different criteria. Today I fou...
Cracking the coding interview is a crucial step in landing our dream tech job. My blog post covers some useful coding interview resources, including source o...
If you’re writing mathematical documents, Latex is a great tool for creating professional-looking equations and symbols. However, it can be overwhelming to u...
Nowadays, graduate students are focusing on preparing better CV/Resume templates in Latex rather than preparing one in other word processing tools.
Creating a taxonomy tree is essential for scientific research papers, dissertations, or reports. A well-organized taxonomy tree provides a comprehensive and ...
If you are a beginner in LaTeX or even an experienced user, you might find it difficult to keep track of all the resources available out there. This blog pos...
Are you searching for a stunning and free Bootstrap template to showcase your personal portfolio or website? Bootstrap is a powerful and widely-used framewor...
Are you searching for a stunning and free Bootstrap template to showcase your personal portfolio or website? Bootstrap is a powerful and widely-used framewor...
Recently, I was looking for a few one-page resume templates in Latex. Obviously, the best resource collection to start looking for is the Overleaf Template G...
Nowadays, graduate students are focusing on preparing better CV/Resume templates in Latex rather than preparing one in other word processing tools.
Learn how to exploit ARM-based systems with Raspberry Pi using Return Oriented Programming (ROP) techniques. This beginner-friendly guide will introduce you ...
In this blog post, we will discuss ARM exploitation techniques using Raspberry Pi and focus on Return-to-Libc exploitation, which is a common technique used ...
In this tutorial series, we have been exploring the implementation of a reverse proxy server in Python. In Part 4, we will create a shell script for automati...
In this third part of the, Write a Reverse Proxy Server in Python, series, we’ll cover the client-side script implementation. The client-side script is the s...
In this second part of our, Write a Reverse Proxy Server in Python, tutorial series, we will be discussing how to create a server pool to handle requests. By...
In this tutorial, you will learn how to write a reverse proxy server in Python. Reverse proxies are used to distribute traffic across multiple servers or to ...
The life stories of scientists and mathematicians have always fascinated people, and Hollywood has taken notice. Many movies have been made based on the live...
If you’re looking for some inspiration and motivation to conquer your own personal mountains, then watching mountain climbing documentaries is a great way to...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
In this blog post, we take you on a journey through our second day in Colorado where we visit the picturesque Rocky Mountain National Park. From stunning vie...
Join me as I embark on a journey to explore the stunning state of Colorado. In this travel blog post, I will take you through my tour plans for Day 01 and sh...
Installation of Ryu Controller and Mininet
OpenFlow is a popular networking protocol that allows for the centralized management and control of network devices such as switches and routers. With OpenFl...
Configuring a Raspberry Pi as an OpenFlow switch (low cost open flow switch) can be a great way to set up your own network. However, the process can be compl...
Installation of Ryu Controller and Mininet
If you’re a Jekyll blogger and struggling with 404 errors on your blog website, there is a way to fix this issue. Broken links and missing pages can frustrat...
A Security Information and Event Management (SIEM) system collects log data from various sources within an organization’s IT infrastructure. This data is use...
This post introduces the security solutions for Enterprise Systems. I discuss the basic functionalities and key differences among SIEM, EDR, and SOAR.
This post introduces the security solutions for Enterprise Systems. I discuss the basic functionalities and key differences among SIEM, EDR, and SOAR.
If you’re interested in learning web application vulnerabilities, installing Damn Vulnerable Web Application (DVWA) is a great way to get started. DVWA is a ...
If you’re interested in learning how to analyze vulnerable code, you’ll want to check out this tutorial series by Harsh Bothra. In the series, he covers vari...
Managing and automating scripts on Linux systems is crucial for ensuring smooth operations. One effective solution for this is Supervisor, which is a powerfu...
awk
Command: Basic and Templates
awk is a versatile tool that can be used to search, filter, and manipulate text files, making it a go-to tool for site reliability engineers. In this blog po...
In site reliability engineering, log analysis is a crucial aspect of maintaining system availability and identifying potential issues. However, analyzing log...
Your blog post excerpt
In SRE, performance optimization and tuning are crucial for ensuring systems can quickly handle expected workloads and respond to user requests. This involve...
High availability and redundancy are critical components of any successful data management strategy. In Site Reliability Engineering (SRE), ensuring the avai...
Disaster recovery planning is a critical aspect of SRE that involves preparing for and mitigating the impact of catastrophic events that could disrupt your s...
In Day 14 of #100daysofSRE, we dive into the world of load testing and stress testing in Site Reliability Engineering (SRE). Load testing and stress testing ...
In this post, I’ll dive into capacity planning and management in SRE, including its importance, techniques, tools, and best practices. I’ll also explore capa...
In this blog post, I’ll dive into the topic of alerting and notification strategies for Site Reliability Engineering (SRE). Alerting and notification are cru...
In the world of Site Reliability Engineering (SRE), logging and log analysis play a critical role in ensuring reliable and performant systems. However, colle...
Are you looking for an easy way to compare and find alternatives of different cloud services across AWS, Azure, and GCP? Look no further than a GitHub reposi...
In today’s #100daysofSRE post, we’ll be exploring the key differences between Grafana and Splunk, two of the most popular tools for monitoring system and app...
In Day 9 of #100daysofSRE, we dive into the world of monitoring and observability in SRE. Learn how to improve the reliability and performance of your system...
Root cause analysis (RCA) and post-incident reviews (PIR) are critical processes for site reliability engineers (SREs) to improve the reliability and resilie...
In this post, I’ll be discussing the importance of effective communication during incidents in order to improve incident response in Site Reliability Enginee...
In Day 6 of #100daysofSRE, we’ll dive into the critical role of incident management and response in Site Reliability Engineering (SRE). We’ll explore the bes...
In the fifth post of #100daysofSRE series, we will discuss how automation benefits Site Reliability Engineering (SRE) and how automation techniques and tools...
Welcome to Day 4 of #100daysofSRE! Today, I’ll be discussing Chaos Engineering and its role in Site Reliability Engineering. Chaos Engineering is a practice ...
In Site Reliability Engineering (SRE), metrics play a vital role in measuring the reliability of a system. Three key metrics in this regard are Service Level...
Site Reliability Engineering (SRE) is a relatively new field that has gained tremendous popularity in recent years. It was first introduced by Google in 2003...
Site Reliability Engineering (SRE) is a discipline that emerged from Google’s need to manage the massive scale of their infrastructure. It’s a cross-function...
MITRE ATT&CK is an essential tool for any organization who are concerned about cybersecurity, especially threat intelligence and threat modeling. In this...
In this post, I will take you through the first part of our journey exploring Santa Elena Canyon, one of the park’s most stunning natural wonders. It is loca...
The life stories of scientists and mathematicians have always fascinated people, and Hollywood has taken notice. Many movies have been made based on the live...
This post includes code snippets for drawing different stylish plots using the Seaborn Module
With the increasing sophistication of cyber threats and the growing amount of data generated by organizations, data analytics has become an essential tool fo...
In the following, I list some useful GitHub repositories related to the security certification exam Certified Ethical Hacker (CEH).
A Security Information and Event Management (SIEM) system collects log data from various sources within an organization’s IT infrastructure. This data is use...
Cyber deception is a technique used to detect and mitigate cybersecurity threats. Honeypots are an essential component of cyber deception, as they are design...
Are you interested in setting up a live video monitoring system using a Raspberry Pi and any webcam? With this tutorial, you’ll learn how to set up a simple ...
In today’s digital age, game theory is becoming an essential tool for understanding cyber security. Game theory allows security professionals to model the in...
Passive operating system fingerprinting is a critical skill for any network security professional. By analyzing PCAP files, it is possible to identify the op...
Password cracking is an essential skill for ethical hackers and security researchers. One of the most straightforward ways to crack a password is by using a ...
In this tutorial, you’ll learn how to convert PCAP files to CSV format for network traffic analysis using Python. You’ll see how to use the tshark library to...
In today’s digital age, game theory is becoming an essential tool for understanding cyber security. Game theory allows security professionals to model the in...
Learn how to scrape data from Medium.com blogs by clicking the ‘Show More’ button multiple times using Selenium in Python. This tutorial covers step-by-step ...
Collaborating with others on a writing project can be a challenge, especially when everyone is working on different parts of the document. Overleaf, a collab...
In this tutorial series, we have been exploring the implementation of a reverse proxy server in Python. In Part 4, we will create a shell script for automati...
Setting up your lab for ARM exploitation with Raspberry Pi requires a few steps to ensure that everything runs smoothly. In this blog post, I will provide a ...
If you’re into exploit development, you’ve probably heard of Return Oriented Programming (ROP). ROP gadgets are small code snippets that can be chained toget...
Installation of Ryu Controller and Mininet
Discover 30 Python code snippets that can save you valuable time and help you get your next project up and running quickly. These code snippets include time-...
If you’re looking for some interesting and useful Python code snippets to use in your projects, look no further. In this blog post, we’ve compiled a list of ...
Looking for a cheat sheet to improve your Jekyll-based blog using the Minimal Mistakes theme? In this blog post, I share some code snippets that I use to enh...
In this tutorial series, we have been exploring the implementation of a reverse proxy server in Python. In Part 4, we will create a shell script for automati...
In this third part of the, Write a Reverse Proxy Server in Python, series, we’ll cover the client-side script implementation. The client-side script is the s...
In this second part of our, Write a Reverse Proxy Server in Python, tutorial series, we will be discussing how to create a server pool to handle requests. By...
In this tutorial, you will learn how to write a reverse proxy server in Python. Reverse proxies are used to distribute traffic across multiple servers or to ...
Have you ever wanted to create a simple chatting program in Python? Maybe for a small project or to learn about networking and communication protocols. Look ...
If you’re looking to start or improve your blogging game, it’s important to have the right tools and platforms at your disposal. From content creation to web...
Are you new to LaTeX and struggling to get the desired output for your document? You are not alone. Many new users make common mistakes that hinder their pro...
In today’s digital age, game theory is becoming an essential tool for understanding cyber security. Game theory allows security professionals to model the in...
Discover the beauty of Martin Dies, Jr. State Park located in Jasper, TX, where camping and biking enthusiasts can experience the great outdoors. With its hu...
Are you tired of your IP address changing every time you restart your Linux/Raspbian OS? Setting up a static IP address can make your life much easier! In th...
Join me as I embark on a journey to explore the stunning state of Colorado. In this travel blog post, I will take you through my tour plans for Day 01 and sh...
If you’re writing a research survey paper, a well-organized and properly formatted literature survey table is a must-have. A literature survey table summariz...
Configuring a Raspberry Pi as an OpenFlow switch (low cost open flow switch) can be a great way to set up your own network. However, the process can be compl...
This post introduces Javascript basic syntax to the Python Programmers in a few minutes
Are you tired of your IP address changing every time you restart your Linux/Raspbian OS? Setting up a static IP address can make your life much easier! In th...
In research/development testbeds, there is often a need to connect multiple local area networks together. One way to achieve this is by using a Raspberry Pi ...
If you’re tired of constantly entering your password when logging into a remote server via SSH, there is a better way. In this blog post, I’ll show you how t...
MITRE ATT&CK is an essential tool for any organization who are concerned about cybersecurity, especially threat intelligence and threat modeling. In this...
Adding a signature line and space in LaTeX is an essential part of writing formal documents such as letters, resumes, and contracts. In this tutorial, we wil...
If you’re writing a research survey paper, a well-organized and properly formatted literature survey table is a must-have. A literature survey table summariz...
Tables are a vital component of scientific documentation and publishing, and it’s essential to create them with precision and care. In this post, we’ll explo...
In academic writing, a literature survey is an essential component for presenting a comprehensive review of a topic. A taxonomy tree can be used to visually ...
Creating a taxonomy tree is essential for scientific research papers, dissertations, or reports. A well-organized taxonomy tree provides a comprehensive and ...
Cracking the coding interview is a crucial step in landing our dream tech job. My blog post covers some useful coding interview resources, including source o...
Desktop as a Service (DaaS) is the latest trend in cloud computing, providing users with virtual desktop environments that can be accessed from anywhere, at ...
Writing a thesis or dissertation can be daunting in Latex, especially when it comes to formatting, including tables and algorithms or subfigures. Fortunately...
Are you searching for a stunning and free Bootstrap template to showcase your personal portfolio or website? Bootstrap is a powerful and widely-used framewor...
Are you struggling with classifying multiple types of objects in your machine learning project? This can be a challenging task, especially when working with ...
Recently, I was looking for a few one-page resume templates in Latex. Obviously, the best resource collection to start looking for is the Overleaf Template G...
Are you tired of manually removing the ACM sigconf template’s copyright information from your research papers or latex documents like reports or homeworks? T...
If you are looking for a fun and exciting way to get outside and explore nature, mountain biking (MTB) is the perfect activity. Anthills Hike and Bike Trail ...
Discover the most popular parks in Houston for walking, running, and biking. Whether you are looking for a peaceful stroll, a scenic bike ride, or a challeng...
Looking for an exciting day-long tour in Austin? Look no further! This article covers a variety of outdoor activities that will take you on a hiking, biking,...
Are you planning to move to Houston from the Indian Sub-continent? There are a few things that you should know before moving to Houston. Read on to learn abo...
Looking for a weekend getaway near Houston? Look no further than the San Jacinto Battleground and Huntsville Lake! Explore the historic site of the Battle of...
It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...
MITRE ATT&CK is an essential tool for any organization who are concerned about cybersecurity, especially threat intelligence and threat modeling. In this...
A Security Information and Event Management (SIEM) system collects log data from various sources within an organization’s IT infrastructure. This data is use...
MITRE ATT&CK is an essential tool for any organization who are concerned about cybersecurity, especially threat intelligence and threat modeling. In this...
This post introduces the security solutions for Enterprise Systems. I discuss the basic functionalities and key differences among SIEM, EDR, and SOAR.
A Security Information and Event Management (SIEM) system collects log data from various sources within an organization’s IT infrastructure. This data is use...
Learn how to easily convert your Python Matplotlib plots to LaTeX format using just a few lines of code. Latex plots are better in academic writings for conf...
Looking for a more professional-looking and publication-ready plot for your reports and research papers? Latex plots is the perfect solution for you. With it...
Want to plot multiple y-axes on a single LaTeX PGFPlots plot? Check out this tutorial on how to draw multiple y-axes in LaTeX PGFPlots. Whether you are a sci...
If you’re looking to create professional-looking equations with clear parameter descriptions, then using Tikz in Latex can be a great solution. In this tutor...
If you need to create line plots from a CSV file, LaTeX TikZ and PGFPlot offer powerful tools to help you achieve this task with ease. In this blog post, I’l...
Learn how to download a specific subfolder or file from a Github repository without having to clone the entire repository. This post explains two easy method...
In this tutorial, you will learn how to install Jekyll, a simple static site generator, on macOS and use the popular Minimal Mistakes theme to create a clean...
Are you an international student who has just arrived in the USA for higher studies? Congratulations! Now that you’ve made it here, it’s time to get yourself...
Are you a computer science student who just installed Ubuntu on your machine? Here are some essential things you should do to set up your development environ...
In this tutorial, you’ll learn how to convert PCAP files to CSV format for network traffic analysis using Python. You’ll see how to use the tshark library to...
Discover the most popular parks in Houston for walking, running, and biking. Whether you are looking for a peaceful stroll, a scenic bike ride, or a challeng...
Join me on a journey with ‘Digital Nomad Goals’ where we build a community of travel enthusiasts and digital nomads! Let’s dive into a collection of travel d...
Escape the Houston city and explore the beauty of nature at Huntsville State Park located near Houston. In this post, I add some guidelines to hiking and bik...
Discover the fascinating surrounding of the Fort Travis Historic Site at Port Bolivar Texas through a drone shot. This post provides you on a journey in bird...
Explore the Chisos Basin Mountains of the Big Bend National Park in Texas in Part 02 of our road trip series from Houston. Get tips on hiking trails, wildlif...
In this post, I will take you through the first part of our journey exploring Santa Elena Canyon, one of the park’s most stunning natural wonders. It is loca...
Discover the beautiful sea beaches of Corpus Christi, Texas! From the soft white sands of Whitecap Beach to the awesome dunes of Mustang Island and the famil...
Discover the beauty of Martin Dies, Jr. State Park located in Jasper, TX, where camping and biking enthusiasts can experience the great outdoors. With its hu...
Planning a camping trip? Don’t forget to pack all the essentials with this comprehensive camping checklist. From shelter and bedding to cooking equipment and...
Looking for an exciting day-long tour in Austin? Look no further! This article covers a variety of outdoor activities that will take you on a hiking, biking,...
Looking for a weekend getaway near Houston? Look no further than the San Jacinto Battleground and Huntsville Lake! Explore the historic site of the Battle of...
It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...
I got admitted as a Ph.D. student at the University of Houston, leaving for the USA this August. Here, I list the items to take to the USA as an internationa...
Are you a student in Bangladesh who’s looking for opportunities to travel abroad? The Bangladesh-Sweden Trust Fund for Research and Development (BSTF) offers...
In academic writing, a literature survey is an essential component for presenting a comprehensive review of a topic. A taxonomy tree can be used to visually ...
Backdoors are one of the most common types of malware used by hackers to gain access to a target system. In this tutorial, I will teach you how to write a si...
Want to understand how keyloggers work? This blog post will guide you through writing a basic keylogger in Python. Keyloggers can be useful tools for monitor...
Discover 30 Python code snippets that can save you valuable time and help you get your next project up and running quickly. These code snippets include time-...
Learn how to build a RESTful API in Python using Flask and PostgreSQL. In this tutorial, you’ll learn how to connect Flask to a PostgreSQL database and creat...
OpenFlow is a popular networking protocol that allows for the centralized management and control of network devices such as switches and routers. With OpenFl...
Installing a specific version of Linux header in a Raspberry Pi can be crucial for certain applications to work. However, it can be a tricky process if you a...
Configuring a Raspberry Pi as an OpenFlow switch (low cost open flow switch) can be a great way to set up your own network. However, the process can be compl...
Want to improve the performance of your PostgreSQL database? In this post, I will discuss how to monitor and analyze the performance of your PostgreSQL datab...
Learn how to build a simple chat application using Python and the ZeroMQ module! Our step-by-step guide will teach you about publisher-subscriber messaging a...
Logging is a critical component of any Python project, and here, I write a simple tutorial and example templates to use that will help you to have a head sta...
Python Faker Module enables us to generate realistic-looking fake data for ensuring data privacy by masking sensitive data with fake data. In this blog post,...
Twitter is a popular source of data (tweets), but accessing the tweets can be a challenge. Previously I scraped data from Medium. In this tutorial, I write h...
Learn how to create beautiful group-plots in Python with this step-by-step guide. With examples using Matplotlib and Pandas, you can master the art of visual...
Learn about the difference between symmetric and asymmetric key cryptography in Python with this tutorial. Discover how to use cryptographic algorithms in py...
If you’ve recently installed Ubuntu on your Raspberry Pi, you might have encountered the black screen issue when booting up. This is a common problem with a ...
Learn how to easily convert your Python Matplotlib plots to LaTeX format using just a few lines of code. Latex plots are better in academic writings for conf...
Learn how to scrape data from Medium.com blogs by clicking the ‘Show More’ button multiple times using Selenium in Python. This tutorial covers step-by-step ...
Are you tired of manually copying and pasting data from a Medium blog post? In this tutorial, we will learn how to extract the necessary contents from a Medi...
Overleaf is a popular web-based platform for writing and collaborating on LaTeX documents. The platform is widely used extensively in the academic communitie...
Looking for a comprehensive collection of Cyber Security resources in Python? From books to codes and everything in between that are available on GitHub, thi...
Learn how to set up headless Kali Linux in a Raspberry Pi 4 without the need for a monitor, keyboard, and mouse. This step-by-step guide will walk you throug...
If you’re interested in learning web application vulnerabilities, installing Damn Vulnerable Web Application (DVWA) is a great way to get started. DVWA is a ...
If you’re interested in learning how to analyze vulnerable code, you’ll want to check out this tutorial series by Harsh Bothra. In the series, he covers vari...
Looking for a more professional-looking and publication-ready plot for your reports and research papers? Latex plots is the perfect solution for you. With it...
If you’re looking to create high-quality videos, having the right equipment is essential. In this post, I’ll share the devices I use to capture my videos, in...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
This post explains how to clone a website and then run in a docker container for testing and learning purpose
Want to plot multiple y-axes on a single LaTeX PGFPlots plot? Check out this tutorial on how to draw multiple y-axes in LaTeX PGFPlots. Whether you are a sci...
YubiKey is a small, portable hardware-based security key that adds an extra layer of protection to our online accounts. It is a two-factor authentication (2F...
Building a mobile app in Python has never been easier with the Kivy framework. This open-source Python library allows developers to create beautiful and func...
Data Science in Python
Posts in my Blog
This post provides all the links of posts related to data science in python.
Overleaf has been the mostly used cloud-based Latex editor that features collaboration and provides numerous templates across different criteria. Today I fou...
In academic writing, a literature survey is an essential component for presenting a comprehensive review of a topic. A taxonomy tree can be used to visually ...
If you’re looking to create professional-looking equations with clear parameter descriptions, then using Tikz in Latex can be a great solution. In this tutor...
DevOps is a software development approach that aims to bridge the gap between development and operations teams, ensuring faster and more efficient delivery o...
Are you interested in setting up a live video monitoring system using a Raspberry Pi and any webcam? With this tutorial, you’ll learn how to set up a simple ...
Operating System Fingerprinting is a process of identifying the type of operating system running on a remote machine by analyzing the packets captured on the...
In this blog post, we will guide you on how to launch an Amazon Web Service (AWS) Elastic Compute Cloud (EC2) instance. AWS EC2 is a popular cloud computing ...
In this post, we will introduce you to deep learning in Python using Keras and Tensorflow with the popular MNIST dataset. We will walk you through the steps ...
In this tutorial series, we have been exploring the implementation of a reverse proxy server in Python. In Part 4, we will create a shell script for automati...
Are you struggling with classifying multiple types of objects in your machine learning project? This can be a challenging task, especially when working with ...
In this third part of the, Write a Reverse Proxy Server in Python, series, we’ll cover the client-side script implementation. The client-side script is the s...
In this second part of our, Write a Reverse Proxy Server in Python, tutorial series, we will be discussing how to create a server pool to handle requests. By...
Reinforcement Learning is an exciting and powerful technique used in artificial intelligence and machine learning. In this tutorial, we will dive into Q-Lear...
In this second part of our Reinforcement Learning series, we will introduce you to some of the fundamental glossaries and concepts that you need to know befo...
Reinforcement learning is a subfield of machine learning that focuses on training agents to make sequential decisions in an environment. In this introductory...
Writing a worm in Python can seem like a daunting task, but it’s an excellent way to learn about computer security and how these types of programs work. In t...
In this tutorial, you will learn how to write a reverse proxy server in Python. Reverse proxies are used to distribute traffic across multiple servers or to ...
Have you ever wondered how viruses work? What if you could learn about viruses by writing your own simple, harmless virus in Python? In this blog post, I wil...
Backdoors are one of the most common types of malware used by hackers to gain access to a target system. In this tutorial, I will teach you how to write a si...
Want to understand how keyloggers work? This blog post will guide you through writing a basic keylogger in Python. Keyloggers can be useful tools for monitor...
If you’re looking to start or improve your blogging game, it’s important to have the right tools and platforms at your disposal. From content creation to web...
Setting up Git credentials is an essential step in securing your Git repository. However, you may encounter situations where you need to use different user c...
Collaborating with others on a writing project can be a challenge, especially when everyone is working on different parts of the document. Overleaf, a collab...
Passive operating system fingerprinting is a critical skill for any network security professional. By analyzing PCAP files, it is possible to identify the op...
Learn how to add LaTeX math equations to Jekyll-based theme Minimal Mistakes with just a few easy steps! This tutorial will guide you through the process, al...
This post introduces Javascript basic syntax to the Python Programmers in a few minutes
Password cracking is an essential skill for ethical hackers and security researchers. One of the most straightforward ways to crack a password is by using a ...
Hash tables are one of the most efficient data structures for storing and retrieving data. In this post, I will discuss the concept of hash tables and how th...
In this tutorial, you will learn how to install Jekyll, a simple static site generator, on macOS and use the popular Minimal Mistakes theme to create a clean...
qrcode
and opencv
module
QR codes are becoming increasingly popular in many applications, from tracking inventory to sharing contact information. In this post, we’ll explore how to c...
Python itertools module is a powerful library to create fast and efficient iterators. It provides a set of functions for working with iterators and can be us...
Learn how to detect objects from images and count them using Python! In this tutorial, we will show you how to use OpenCV and CVLib to perform object detecti...
In this tutorial, you’ll learn how to convert PCAP files to CSV format for network traffic analysis using Python. You’ll see how to use the tshark library to...
Learn the basics of cryptography and explore the process of encryption and decryption using Python. This tutorial covers the essential concepts of symmetric-...
Learn about cryptographic hashes and message digests in Python, and how they are used to ensure the integrity of data. This blog post will cover the basics o...
If you’re working with VirtualBox, you may have encountered a situation where you need to access a guest machine via SSH. However, in the default NAT network...
Adding custom headers to your Python files is an excellent way to provide critical information about your code, such as author name, creation date, and copyr...
Are you tired of manually removing the ACM sigconf template’s copyright information from your research papers or latex documents like reports or homeworks? T...
Looking for a cheat sheet to improve your Jekyll-based blog using the Minimal Mistakes theme? In this blog post, I share some code snippets that I use to enh...
This post presents a generic .gitignore file that ignores Cached Code files and all Hidden Directories Recursively in a Git Repository
Are you looking for some useful Python tips and tricks that can help you write better code? Look no further! In this post, we have compiled a list of some of...
This post includes code snippets for drawing different stylish plots using the Seaborn Module
This post includes code snippets for drawing bar, pie, box, scatter plots, and histograms.
This post explains the basic syntax of matplotlib module for data visualization.
In the previous post, we have seen some basic usages of the pandas module. In this post, we will take a look at some more useful functionalities of the modul...
pandas is the mostly used module while analyzing data from a CSV, JSON, or Excel as the module can convert these data into dataframes and helps to analyze th...
Numpy is a popular python module that provides fast and efficient operations on n-dimensional arrays of homogeneous data. It has variety of functions that ca...
Hello World
App in 5 minutes
Looking for a quick and easy way to create your first web application using Flask? This beginner-friendly tutorial will guide you through the process of buil...
helloworld
App
If you are new to web development, Django can be a great starting point for building robust web applications. In this tutorial, you will learn the basics of ...
This post explains the way of fixing the issue of being unable to install Wordpress themes
listings
package for code documentation
If you’re writing a document that requires code snippets, you’ll need to use a package that supports code formatting in LaTeX. One such package is listings. ...
Are you tired of your IP address changing every time you restart your Linux/Raspbian OS? Setting up a static IP address can make your life much easier! In th...
Learn how to perform matrix operations like addition, subtraction, multiplication, inverse, transpose, and more using Python’s NumPy library. This tutorial w...
Writing matrices with row/column labels is a common requirement in scientific and technical documents. LaTeX provides several ways to accomplish this, and in...
Learn how to exploit ARM-based systems with Raspberry Pi using Return Oriented Programming (ROP) techniques. This beginner-friendly guide will introduce you ...
In this blog post, we will discuss ARM exploitation techniques using Raspberry Pi and focus on Return-to-Libc exploitation, which is a common technique used ...
In this blog post, I will introduce you to ARM exploitation with Raspberry Pi and discuss how to return back to a program without crashing. We will be explor...
Learn how to download a specific subfolder or file from a Github repository without having to clone the entire repository. This post explains two easy method...
Are you interested in ARM exploitation with a Raspberry Pi? In this tutorial, I’ll cover the basics of stack overflow attacks on ARM architecture. You’ll lea...
Setting up your lab for ARM exploitation with Raspberry Pi requires a few steps to ensure that everything runs smoothly. In this blog post, I will provide a ...
In this tutorial, I’ll show you how to install Raspbian OS in Raspberry Pi without using a keyboard and monitor. This method is useful when you don’t have ac...
If you’re into exploit development, you’ve probably heard of Return Oriented Programming (ROP). ROP gadgets are small code snippets that can be chained toget...
If you’re tired of constantly entering your password when logging into a remote server via SSH, there is a better way. In this blog post, I’ll show you how t...
Have you ever wanted to create your own cloud service, but didn’t want to pay for a subscription or worry about privacy concerns? Look no further than buildi...
Matplotlib is a powerful data visualization library in Python. It allows you to create a wide range of charts and graphs, including multiple axis charts with...
Adding a signature line and space in LaTeX is an essential part of writing formal documents such as letters, resumes, and contracts. In this tutorial, we wil...
If you need to create line plots from a CSV file, LaTeX TikZ and PGFPlot offer powerful tools to help you achieve this task with ease. In this blog post, I’l...
Bibliography management is an essential aspect of academic writing, particularly when you have to reference a large number of sources. Bibtex is a widely-use...
Creating a taxonomy tree is essential for scientific research papers, dissertations, or reports. A well-organized taxonomy tree provides a comprehensive and ...
Are you looking to integrate Facebook comments on your Jekyll blog? This blog post will guide you through the steps required to enable Facebook comments plug...
tikz
package causing error in IEEE Access template
If you are working on a LaTeX document using the IEEE Access template and have run into an error caused by the tikz package, you are not alone. In this blog ...
If you are a researcher or a student looking for a way to create high-quality line plots for your scientific documents, then you might want to consider using...
Tables are a vital component of scientific documentation and publishing, and it’s essential to create them with precision and care. In this post, we’ll explo...
Installation of Ryu Controller and Mininet
In this tutorial, we’ll learn how to create beautiful bar charts using the PGFPlots package in Latex. Bar charts are useful for representing discrete data wi...
Bar charts are one of the most commonly used visualizations in data science. They are great for displaying categorical data and comparing values between diff...
Learn how to make lists in Latex using the itemize, enumerate, and to-do-list environments. These are essential tools for organizing and presenting informati...
If you’re using the IEEE conference format to submit your research paper, you may want to add a copyright notice and conference name to your document. In thi...
Learn how to write algorithms in Latex using the algorithmicx package. This package provides an easy-to-use and flexible environment for writing algorithms w...
Subfigures in LaTeX are a great way to add multiple images to a document while maintaining proper placement and referencing. However, they can be a bit trick...
Twitter is a popular source of data (tweets), but accessing the tweets can be a challenge. Previously I scraped data from Medium. In this tutorial, I write h...
Cyber security threats are on the rise, and everyone is vulnerable to attacks. Whether you are an individual, a business owner, or a government agency, it is...
YubiKey is a small, portable hardware-based security key that adds an extra layer of protection to our online accounts. It is a two-factor authentication (2F...
Looking for an exciting day-long tour in Austin? Look no further! This article covers a variety of outdoor activities that will take you on a hiking, biking,...
Looking for a weekend getaway near Houston? Look no further than the San Jacinto Battleground and Huntsville Lake! Explore the historic site of the Battle of...
It is the semester break and a few from our community wanted to have fresh airs. So, we chose Galveston beach as it is just an hour’s drive from Harris Count...
Discover the beautiful sea beaches of Corpus Christi, Texas! From the soft white sands of Whitecap Beach to the awesome dunes of Mustang Island and the famil...
If you’ve recently installed Ubuntu on your Raspberry Pi, you might have encountered the black screen issue when booting up. This is a common problem with a ...
Are you struggling with Ubuntu’s automatic screen scaling issue while using VirtualBox? This can be a frustrating experience, but luckily, there’s a solution...
Are you a computer science student who just installed Ubuntu on your machine? Here are some essential things you should do to set up your development environ...
Writing a thesis or dissertation can be daunting in Latex, especially when it comes to formatting, including tables and algorithms or subfigures. Fortunately...
Adding custom headers to your Python files is an excellent way to provide critical information about your code, such as author name, creation date, and copyr...
Are you struggling with Ubuntu’s automatic screen scaling issue while using VirtualBox? This can be a frustrating experience, but luckily, there’s a solution...
Writing a worm in Python can seem like a daunting task, but it’s an excellent way to learn about computer security and how these types of programs work. In t...
Have you ever wondered how viruses work? What if you could learn about viruses by writing your own simple, harmless virus in Python? In this blog post, I wil...
This post includes code snippets for drawing different stylish plots using the Seaborn Module
This post includes code snippets for drawing bar, pie, box, scatter plots, and histograms.
This post explains the basic syntax of matplotlib module for data visualization.
Matplotlib is a powerful data visualization library in Python. It allows you to create a wide range of charts and graphs, including multiple axis charts with...
If you’re looking to create high-quality videos, having the right equipment is essential. In this post, I’ll share the devices I use to capture my videos, in...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
If you’re interested in learning how to analyze vulnerable code, you’ll want to check out this tutorial series by Harsh Bothra. In the series, he covers vari...
Hello World
App in 5 minutes
Looking for a quick and easy way to create your first web application using Flask? This beginner-friendly tutorial will guide you through the process of buil...
helloworld
App
If you are new to web development, Django can be a great starting point for building robust web applications. In this tutorial, you will learn the basics of ...
If you’re interested in learning web application vulnerabilities, installing Damn Vulnerable Web Application (DVWA) is a great way to get started. DVWA is a ...
If you’re interested in learning how to analyze vulnerable code, you’ll want to check out this tutorial series by Harsh Bothra. In the series, he covers vari...
If you’re interested in learning web application vulnerabilities, installing Damn Vulnerable Web Application (DVWA) is a great way to get started. DVWA is a ...
Discover the beautiful sea beaches of Corpus Christi, Texas! From the soft white sands of Whitecap Beach to the awesome dunes of Mustang Island and the famil...
Passive operating system fingerprinting is a critical skill for any network security professional. By analyzing PCAP files, it is possible to identify the op...
In this tutorial, you’ll learn how to convert PCAP files to CSV format for network traffic analysis using Python. You’ll see how to use the tshark library to...
This post presents the summary of a few concept papers of Natural Language Processing
This post presents the summary of a few concept papers of Natural Language Processing
This post explains the way of fixing the issue of being unable to install Wordpress themes
Writing a worm in Python can seem like a daunting task, but it’s an excellent way to learn about computer security and how these types of programs work. In t...
This post explains the way of fixing the issue of being unable to install Wordpress themes
If you’re interested in learning web application vulnerabilities, installing Damn Vulnerable Web Application (DVWA) is a great way to get started. DVWA is a ...
If you’re interested in learning how to analyze vulnerable code, you’ll want to check out this tutorial series by Harsh Bothra. In the series, he covers vari...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
YubiKey is a small, portable hardware-based security key that adds an extra layer of protection to our online accounts. It is a two-factor authentication (2F...
Learn how to build a simple chat application using Python and the ZeroMQ module! Our step-by-step guide will teach you about publisher-subscriber messaging a...
DevOps is a software development approach that aims to bridge the gap between development and operations teams, ensuring faster and more efficient delivery o...
Do you want a quick and easy way to extract, analyze, and visualize your expenditure data from Splitwise? Splitwise has an API that allows you to extract yo...
Do you want a quick and easy way to extract, analyze, and visualize your expenditure data from Splitwise? Splitwise has an API that allows you to extract yo...
Our latest preprint on Arxiv explores the practical use cases and applications of the MITRE ATT&CK framework in research and practice. This blog post sum...
Learn about the difference between symmetric and asymmetric key cryptography in Python with this tutorial. Discover how to use cryptographic algorithms in py...
DevOps is a software development approach that aims to bridge the gap between development and operations teams, ensuring faster and more efficient delivery o...
Data replication, duplication, and deduplication are three distinct methods for managing data in storage. Each approach has its unique benefits and drawbacks...
Are you new to LaTeX and struggling to get the desired output for your document? You are not alone. Many new users make common mistakes that hinder their pro...
If you’re working with VirtualBox, you may have encountered a situation where you need to access a guest machine via SSH. However, in the default NAT network...
Discover the most popular parks in Houston for walking, running, and biking. Whether you are looking for a peaceful stroll, a scenic bike ride, or a challeng...
Are you a computer science or related fields student approaching graduation? It’s time to start thinking about what you need to do before completing your deg...
If you are interested in cyber security and want to develop your skills in the field, there are many online courses and certifications that you can take adva...
Welcome to Day 4 of #100daysofSRE! Today, I’ll be discussing Chaos Engineering and its role in Site Reliability Engineering. Chaos Engineering is a practice ...
As language models become more prevalent, the importance of strong conversational skills has become essential. In this thought-provoking article, I explore w...
I got admitted as a Ph.D. student at the University of Houston, leaving for the USA this August. Here, I list the items to take to the USA as an internationa...
As an author or scientific content writer, you need tools that can help you to write, edit and publish content with ease. Cloud-based tools offer several adv...
Are you looking for some useful Python tips and tricks that can help you write better code? Look no further! In this post, we have compiled a list of some of...
Collaborating with others on a writing project can be a challenge, especially when everyone is working on different parts of the document. Overleaf, a collab...
This post explains how to clone a website and then run in a docker container for testing and learning purpose
If you are interested in cyber security and want to develop your skills in the field, there are many online courses and certifications that you can take adva...
Are you living in the USA and looking to improve your credit score or establish a credit history? In this blog post, I’ll explore the recommended credit jour...
Are you living in the USA and looking to improve your credit score or establish a credit history? In this blog post, I’ll explore the recommended credit jour...
Managing finances can be challenging for anyone, but as an international student studying in the USA, it can be particularly daunting. In this blog post, I’l...
Learn the basics of cryptography and explore the process of encryption and decryption using Python. This tutorial covers the essential concepts of symmetric-...
Learn about cryptographic hashes and message digests in Python, and how they are used to ensure the integrity of data. This blog post will cover the basics o...
qrcode
and opencv
module
QR codes are becoming increasingly popular in many applications, from tracking inventory to sharing contact information. In this post, we’ll explore how to c...
Learn how to detect objects from images and count them using Python! In this tutorial, we will show you how to use OpenCV and CVLib to perform object detecti...
Learn how to detect objects from images and count them using Python! In this tutorial, we will show you how to use OpenCV and CVLib to perform object detecti...
If you are interested in cyber security and want to develop your skills in the field, there are many online courses and certifications that you can take adva...
Do you want a quick and easy way to extract, analyze, and visualize your expenditure data from Splitwise? Splitwise has an API that allows you to extract yo...
Data replication, duplication, and deduplication are three distinct methods for managing data in storage. Each approach has its unique benefits and drawbacks...
Data replication, duplication, and deduplication are three distinct methods for managing data in storage. Each approach has its unique benefits and drawbacks...
Data replication, duplication, and deduplication are three distinct methods for managing data in storage. Each approach has its unique benefits and drawbacks...
Desktop as a Service (DaaS) is the latest trend in cloud computing, providing users with virtual desktop environments that can be accessed from anywhere, at ...
Managing and automating scripts on Linux systems is crucial for ensuring smooth operations. One effective solution for this is Supervisor, which is a powerfu...
awk
Command: Basic and Templates
awk is a versatile tool that can be used to search, filter, and manipulate text files, making it a go-to tool for site reliability engineers. In this blog po...
In site reliability engineering, log analysis is a crucial aspect of maintaining system availability and identifying potential issues. However, analyzing log...
Your blog post excerpt
In SRE, performance optimization and tuning are crucial for ensuring systems can quickly handle expected workloads and respond to user requests. This involve...
High availability and redundancy are critical components of any successful data management strategy. In Site Reliability Engineering (SRE), ensuring the avai...
Disaster recovery planning is a critical aspect of SRE that involves preparing for and mitigating the impact of catastrophic events that could disrupt your s...
In Day 14 of #100daysofSRE, we dive into the world of load testing and stress testing in Site Reliability Engineering (SRE). Load testing and stress testing ...
In this post, I’ll dive into capacity planning and management in SRE, including its importance, techniques, tools, and best practices. I’ll also explore capa...
In this blog post, I’ll dive into the topic of alerting and notification strategies for Site Reliability Engineering (SRE). Alerting and notification are cru...
In the world of Site Reliability Engineering (SRE), logging and log analysis play a critical role in ensuring reliable and performant systems. However, colle...
Are you looking for an easy way to compare and find alternatives of different cloud services across AWS, Azure, and GCP? Look no further than a GitHub reposi...
In today’s #100daysofSRE post, we’ll be exploring the key differences between Grafana and Splunk, two of the most popular tools for monitoring system and app...
In Day 9 of #100daysofSRE, we dive into the world of monitoring and observability in SRE. Learn how to improve the reliability and performance of your system...
Root cause analysis (RCA) and post-incident reviews (PIR) are critical processes for site reliability engineers (SREs) to improve the reliability and resilie...
In this post, I’ll be discussing the importance of effective communication during incidents in order to improve incident response in Site Reliability Enginee...
In Day 6 of #100daysofSRE, we’ll dive into the critical role of incident management and response in Site Reliability Engineering (SRE). We’ll explore the bes...
In the fifth post of #100daysofSRE series, we will discuss how automation benefits Site Reliability Engineering (SRE) and how automation techniques and tools...
Welcome to Day 4 of #100daysofSRE! Today, I’ll be discussing Chaos Engineering and its role in Site Reliability Engineering. Chaos Engineering is a practice ...
In Site Reliability Engineering (SRE), metrics play a vital role in measuring the reliability of a system. Three key metrics in this regard are Service Level...
Site Reliability Engineering (SRE) is a relatively new field that has gained tremendous popularity in recent years. It was first introduced by Google in 2003...
Site Reliability Engineering (SRE) is a discipline that emerged from Google’s need to manage the massive scale of their infrastructure. It’s a cross-function...
Learn how to download a specific subfolder or file from a Github repository without having to clone the entire repository. This post explains two easy method...
When you start a new Python project, you’ll quickly realize that it includes many different files, each with its own purpose. Understanding these files and t...
This post explains how to clone a website and then run in a docker container for testing and learning purpose
Are you a computer science or related fields student approaching graduation? It’s time to start thinking about what you need to do before completing your deg...
Are you looking for a book that can help you become more productive and successful in your personal and professional life? Look no further than, The 7 Habits...
If you’re looking for some inspiration and motivation to conquer your own personal mountains, then watching mountain climbing documentaries is a great way to...
Writing emails to professors can be a daunting task, especially when it comes to asking for a recommendation letter, inquiring about research opportunities, ...
When you start a new Python project, you’ll quickly realize that it includes many different files, each with its own purpose. Understanding these files and t...
If you’re a Jekyll blogger and struggling with 404 errors on your blog website, there is a way to fix this issue. Broken links and missing pages can frustrat...
If you’re running a Jekyll static site or a blog using the Minimal Mistakes theme, you may be wondering how to incorporate Google Adsense to monetize your si...
Want to track the performance of your Minimal Mistakes blog? Google Analytics is a powerful tool that can help you to measure your website’s traffic, engagem...
In today’s #100daysofSRE post, we’ll be exploring the key differences between Grafana and Splunk, two of the most popular tools for monitoring system and app...
Learn how to create beautiful group-plots in Python with this step-by-step guide. With examples using Matplotlib and Pandas, you can master the art of visual...
Are you looking for a book that can help you become more productive and successful in your personal and professional life? Look no further than, The 7 Habits...
Learn the basics of cryptography and explore the process of encryption and decryption using Python. This tutorial covers the essential concepts of symmetric-...
Learn about cryptographic hashes and message digests in Python, and how they are used to ensure the integrity of data. This blog post will cover the basics o...
Discover the most popular parks in Houston for walking, running, and biking. Whether you are looking for a peaceful stroll, a scenic bike ride, or a challeng...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
Learn how to detect objects from images and count them using Python! In this tutorial, we will show you how to use OpenCV and CVLib to perform object detecti...
If you’re working with data that changes over time, you need a timeseries database to store that information effectively. In this guide, I’ll provide you wit...
As a beginner vlogger, video editing can be an overwhelming task, especially when you are not familiar with the available tools. However, with the right tool...
Python itertools module is a powerful library to create fast and efficient iterators. It provides a set of functions for working with iterators and can be us...
Learn how to build a RESTful API in Python using Flask and PostgreSQL. In this tutorial, you’ll learn how to connect Flask to a PostgreSQL database and creat...
Are you living in the USA and looking to improve your credit score or establish a credit history? In this blog post, I’ll explore the recommended credit jour...
Managing finances can be challenging for anyone, but as an international student studying in the USA, it can be particularly daunting. In this blog post, I’l...
Join me on a journey with ‘Digital Nomad Goals’ where we build a community of travel enthusiasts and digital nomads! Let’s dive into a collection of travel d...
Your blog post excerpt
In the world of Site Reliability Engineering (SRE), logging and log analysis play a critical role in ensuring reliable and performant systems. However, colle...
This post explains the way of fixing the issue of being unable to install Wordpress themes
Learn how to easily convert your Python Matplotlib plots to LaTeX format using just a few lines of code. Latex plots are better in academic writings for conf...
Looking for a more professional-looking and publication-ready plot for your reports and research papers? Latex plots is the perfect solution for you. With it...
Data Science in Python
Posts in my Blog
This post provides all the links of posts related to data science in python.
Writing matrices with row/column labels is a common requirement in scientific and technical documents. LaTeX provides several ways to accomplish this, and in...
Learn how to perform matrix operations like addition, subtraction, multiplication, inverse, transpose, and more using Python’s NumPy library. This tutorial w...
Learn about cryptographic hashes and message digests in Python, and how they are used to ensure the integrity of data. This blog post will cover the basics o...
Discover the most popular parks in Houston for walking, running, and biking. Whether you are looking for a peaceful stroll, a scenic bike ride, or a challeng...
Subfigures in LaTeX are a great way to add multiple images to a document while maintaining proper placement and referencing. However, they can be a bit trick...
If you’re a Jekyll blogger and struggling with 404 errors on your blog website, there is a way to fix this issue. Broken links and missing pages can frustrat...
Managing finances can be challenging for anyone, but as an international student studying in the USA, it can be particularly daunting. In this blog post, I’l...
OpenFlow is a popular networking protocol that allows for the centralized management and control of network devices such as switches and routers. With OpenFl...
Data Science in Python
Posts in my Blog
This post provides all the links of posts related to data science in python.
Learn how to perform matrix operations like addition, subtraction, multiplication, inverse, transpose, and more using Python’s NumPy library. This tutorial w...
Learn how to detect objects from images and count them using Python! In this tutorial, we will show you how to use OpenCV and CVLib to perform object detecti...
qrcode
and opencv
module
QR codes are becoming increasingly popular in many applications, from tracking inventory to sharing contact information. In this post, we’ll explore how to c...
Learn how to detect objects from images and count them using Python! In this tutorial, we will show you how to use OpenCV and CVLib to perform object detecti...
Learn how to boost the performance of your Python PostgreSQL database connections by using a connection pool. In this tutorial, I will go through the steps t...
Passive operating system fingerprinting is a critical skill for any network security professional. By analyzing PCAP files, it is possible to identify the op...
Data Science in Python
Posts in my Blog
This post provides all the links of posts related to data science in python.
Collaborating with others on a writing project can be a challenge, especially when everyone is working on different parts of the document. Overleaf, a collab...
Learn how to easily convert your Python Matplotlib plots to LaTeX format using just a few lines of code. Latex plots are better in academic writings for conf...
Looking for a more professional-looking and publication-ready plot for your reports and research papers? Latex plots is the perfect solution for you. With it...
tikz
package causing error in IEEE Access template
If you are working on a LaTeX document using the IEEE Access template and have run into an error caused by the tikz package, you are not alone. In this blog ...
If you’re working with data that changes over time, you need a timeseries database to store that information effectively. In this guide, I’ll provide you wit...
If you’re working with data that changes over time, you need a timeseries database to store that information effectively. In this guide, I’ll provide you wit...
Learn how to boost the performance of your Python PostgreSQL database connections by using a connection pool. In this tutorial, I will go through the steps t...
Learn about the difference between symmetric and asymmetric key cryptography in Python with this tutorial. Discover how to use cryptographic algorithms in py...
As an author or scientific content writer, you need tools that can help you to write, edit and publish content with ease. Cloud-based tools offer several adv...
Learn the basics of cryptography and explore the process of encryption and decryption using Python. This tutorial covers the essential concepts of symmetric-...
Learn about cryptographic hashes and message digests in Python, and how they are used to ensure the integrity of data. This blog post will cover the basics o...
When you start a new Python project, you’ll quickly realize that it includes many different files, each with its own purpose. Understanding these files and t...
If you’re working with data that changes over time, you need a timeseries database to store that information effectively. In this guide, I’ll provide you wit...
Do you want a quick and easy way to extract, analyze, and visualize your expenditure data from Splitwise? Splitwise has an API that allows you to extract yo...
Python itertools module is a powerful library to create fast and efficient iterators. It provides a set of functions for working with iterators and can be us...
Python itertools module is a powerful library to create fast and efficient iterators. It provides a set of functions for working with iterators and can be us...
Learn how to perform matrix operations like addition, subtraction, multiplication, inverse, transpose, and more using Python’s NumPy library. This tutorial w...
This post explains how to clone a website and then run in a docker container for testing and learning purpose
If you’re a Jekyll blogger and struggling with 404 errors on your blog website, there is a way to fix this issue. Broken links and missing pages can frustrat...
If you’re tired of constantly entering your password when logging into a remote server via SSH, there is a better way. In this blog post, I’ll show you how t...
Data replication, duplication, and deduplication are three distinct methods for managing data in storage. Each approach has its unique benefits and drawbacks...
When you start a new Python project, you’ll quickly realize that it includes many different files, each with its own purpose. Understanding these files and t...
As an author or scientific content writer, you need tools that can help you to write, edit and publish content with ease. Cloud-based tools offer several adv...
If you’re a Jekyll blogger and struggling with 404 errors on your blog website, there is a way to fix this issue. Broken links and missing pages can frustrat...
As language models become more prevalent, the importance of strong conversational skills has become essential. In this thought-provoking article, I explore w...
If you are interested in cyber security and want to develop your skills in the field, there are many online courses and certifications that you can take adva...
Our latest preprint on Arxiv explores the practical use cases and applications of the MITRE ATT&CK framework in research and practice. This blog post sum...
Learn about cryptographic hashes and message digests in Python, and how they are used to ensure the integrity of data. This blog post will cover the basics o...
Are you a computer science or related fields student approaching graduation? It’s time to start thinking about what you need to do before completing your deg...
If you’re looking for some inspiration and motivation to conquer your own personal mountains, then watching mountain climbing documentaries is a great way to...
Do you want a quick and easy way to extract, analyze, and visualize your expenditure data from Splitwise? Splitwise has an API that allows you to extract yo...
In today’s #100daysofSRE post, we’ll be exploring the key differences between Grafana and Splunk, two of the most popular tools for monitoring system and app...
If you’re working with VirtualBox, you may have encountered a situation where you need to access a guest machine via SSH. However, in the default NAT network...
If you’re tired of constantly entering your password when logging into a remote server via SSH, there is a better way. In this blog post, I’ll show you how t...
Subfigures in LaTeX are a great way to add multiple images to a document while maintaining proper placement and referencing. However, they can be a bit trick...
Learn about the difference between symmetric and asymmetric key cryptography in Python with this tutorial. Discover how to use cryptographic algorithms in py...
Managing and automating scripts on Linux systems is crucial for ensuring smooth operations. One effective solution for this is Supervisor, which is a powerfu...
awk
Command: Basic and Templates
awk is a versatile tool that can be used to search, filter, and manipulate text files, making it a go-to tool for site reliability engineers. In this blog po...
In site reliability engineering, log analysis is a crucial aspect of maintaining system availability and identifying potential issues. However, analyzing log...
Your blog post excerpt
In SRE, performance optimization and tuning are crucial for ensuring systems can quickly handle expected workloads and respond to user requests. This involve...
High availability and redundancy are critical components of any successful data management strategy. In Site Reliability Engineering (SRE), ensuring the avai...
Disaster recovery planning is a critical aspect of SRE that involves preparing for and mitigating the impact of catastrophic events that could disrupt your s...
In Day 14 of #100daysofSRE, we dive into the world of load testing and stress testing in Site Reliability Engineering (SRE). Load testing and stress testing ...
In this post, I’ll dive into capacity planning and management in SRE, including its importance, techniques, tools, and best practices. I’ll also explore capa...
In this blog post, I’ll dive into the topic of alerting and notification strategies for Site Reliability Engineering (SRE). Alerting and notification are cru...
In the world of Site Reliability Engineering (SRE), logging and log analysis play a critical role in ensuring reliable and performant systems. However, colle...
Are you looking for an easy way to compare and find alternatives of different cloud services across AWS, Azure, and GCP? Look no further than a GitHub reposi...
In today’s #100daysofSRE post, we’ll be exploring the key differences between Grafana and Splunk, two of the most popular tools for monitoring system and app...
In Day 9 of #100daysofSRE, we dive into the world of monitoring and observability in SRE. Learn how to improve the reliability and performance of your system...
Root cause analysis (RCA) and post-incident reviews (PIR) are critical processes for site reliability engineers (SREs) to improve the reliability and resilie...
In this post, I’ll be discussing the importance of effective communication during incidents in order to improve incident response in Site Reliability Enginee...
In Day 6 of #100daysofSRE, we’ll dive into the critical role of incident management and response in Site Reliability Engineering (SRE). We’ll explore the bes...
In the fifth post of #100daysofSRE series, we will discuss how automation benefits Site Reliability Engineering (SRE) and how automation techniques and tools...
Welcome to Day 4 of #100daysofSRE! Today, I’ll be discussing Chaos Engineering and its role in Site Reliability Engineering. Chaos Engineering is a practice ...
In Site Reliability Engineering (SRE), metrics play a vital role in measuring the reliability of a system. Three key metrics in this regard are Service Level...
Site Reliability Engineering (SRE) is a relatively new field that has gained tremendous popularity in recent years. It was first introduced by Google in 2003...
Site Reliability Engineering (SRE) is a discipline that emerged from Google’s need to manage the massive scale of their infrastructure. It’s a cross-function...
DevOps is a software development approach that aims to bridge the gap between development and operations teams, ensuring faster and more efficient delivery o...
Our latest preprint on Arxiv explores the practical use cases and applications of the MITRE ATT&CK framework in research and practice. This blog post sum...
Our latest preprint on Arxiv explores the practical use cases and applications of the MITRE ATT&CK framework in research and practice. This blog post sum...
tikz
package causing error in IEEE Access template
If you are working on a LaTeX document using the IEEE Access template and have run into an error caused by the tikz package, you are not alone. In this blog ...
If you’re working with data that changes over time, you need a timeseries database to store that information effectively. In this guide, I’ll provide you wit...
Are you looking for some useful Python tips and tricks that can help you write better code? Look no further! In this post, we have compiled a list of some of...
Desktop as a Service (DaaS) is the latest trend in cloud computing, providing users with virtual desktop environments that can be accessed from anywhere, at ...
OpenStack is a popular cloud computing platform that allows users to manage large pools of storage, compute, and networking resources. If you’re looking to i...
Twitter is a popular source of data (tweets), but accessing the tweets can be a challenge. Previously I scraped data from Medium. In this tutorial, I write h...
Twitter is a popular source of data (tweets), but accessing the tweets can be a challenge. Previously I scraped data from Medium. In this tutorial, I write h...
When you start a new Python project, you’ll quickly realize that it includes many different files, each with its own purpose. Understanding these files and t...
If you’re working with VirtualBox, you may have encountered a situation where you need to access a guest machine via SSH. However, in the default NAT network...
Data Science in Python
Posts in my Blog
This post provides all the links of posts related to data science in python.
This post explains how to clone a website and then run in a docker container for testing and learning purpose
If you’re looking for some inspiration and motivation to conquer your own personal mountains, then watching mountain climbing documentaries is a great way to...