DEV Community

natarajan c k profile picture

natarajan c k

Software Developer

Demystifying ulimit in Linux & macOS: Soft vs Hard Limits Explained

Demystifying ulimit in Linux & macOS: Soft vs Hard Limits Explained

1
Comments
1 min read
Subdomain Takeover: How Empty Shops on the Internet Get Hijacked

Subdomain Takeover: How Empty Shops on the Internet Get Hijacked

1
Comments
1 min read
Shallow Copy vs Deep Copy: When and How to Use Them in Javascript

Shallow Copy vs Deep Copy: When and How to Use Them in Javascript

1
Comments
1 min read
Stop Binding Events the Hard Way — Use Event Delegation Instead 🚀

Stop Binding Events the Hard Way — Use Event Delegation Instead 🚀

1
Comments
1 min read
The Journey of a Click: From Capturing to Bubbling

The Journey of a Click: From Capturing to Bubbling

1
Comments
1 min read
Base64 in Action: How to Encode, Decode and Use it Everywhere

Base64 in Action: How to Encode, Decode and Use it Everywhere

1
Comments
1 min read
Javascript Loading Secrets: How to Make Your Scripts Fly

Javascript Loading Secrets: How to Make Your Scripts Fly

1
Comments
1 min read
Time Travelling the Web: Exploring the Power of Wayback URLs

Time Travelling the Web: Exploring the Power of Wayback URLs

1
Comments
1 min read
Beyond Scroll Events: Harnessing MutationObserver for Smarter DOM Tracking

Beyond Scroll Events: Harnessing MutationObserver for Smarter DOM Tracking

1
Comments
1 min read
Peekaboo Elements: How the Intersection Observer Sees What You See

Peekaboo Elements: How the Intersection Observer Sees What You See

1
Comments
1 min read
Fix SEO and Load Speed Together Using SSR

Fix SEO and Load Speed Together Using SSR

1
Comments
1 min read
Chapter 18 (Task Management System): Adding Analytics and Reporting to the Task Management System

Chapter 18 (Task Management System): Adding Analytics and Reporting to the Task Management System

1
Comments
1 min read
Scalability by Design: How to Build Apps That Grow and Handle Millions

Scalability by Design: How to Build Apps That Grow and Handle Millions

1
Comments
1 min read
Hydration in Web Frameworks: Breathing Life into Pre-Rendered Pages

Hydration in Web Frameworks: Breathing Life into Pre-Rendered Pages

1
Comments
1 min read
From HTTP/1.1 to HTTP/3: How the Internet Got Faster and Safer

From HTTP/1.1 to HTTP/3: How the Internet Got Faster and Safer

1
Comments
1 min read
Why the Lock Icon in Your Browser Actually Matters: The Role of SSL and TLS

Why the Lock Icon in Your Browser Actually Matters: The Role of SSL and TLS

1
Comments
1 min read
How CDNs (Content Delivery Network) Make the Internet Feel Instant

How CDNs (Content Delivery Network) Make the Internet Feel Instant

Comments
1 min read
Understanding Bitcoin and Cryptocurrency: The Essentials

Understanding Bitcoin and Cryptocurrency: The Essentials

Comments
1 min read
Blockchain in a Nutshell: Simplifying the Digital Revolution

Blockchain in a Nutshell: Simplifying the Digital Revolution

Comments
1 min read
What Happens Before Your Computer Boots? Meet Firmware

What Happens Before Your Computer Boots? Meet Firmware

Comments
1 min read
Smishing Scams: Don’t Let That Text Message Trick You!

Smishing Scams: Don’t Let That Text Message Trick You!

Comments
1 min read
Cross Platform Pitfalls: The CRLF and LF Dilemma

Cross Platform Pitfalls: The CRLF and LF Dilemma

Comments
1 min read
From Code to Execution: How JDK, JRE, and JVM Power Java Applications

From Code to Execution: How JDK, JRE, and JVM Power Java Applications

Comments
1 min read
Remote Procedure Call (RPC): When One App Calls Another — Across the Distance

Remote Procedure Call (RPC): When One App Calls Another — Across the Distance

Comments
1 min read
Decoding Inter Process Communication: How Software Components Talk to Each Other

Decoding Inter Process Communication: How Software Components Talk to Each Other

Comments
1 min read
32-bit vs. 64-bit: Why Your App Works on One Windows and Not the Other

32-bit vs. 64-bit: Why Your App Works on One Windows and Not the Other

Comments
1 min read
What Happens When Your Computer Runs Out of RAM? The Role of Virtual Memory

What Happens When Your Computer Runs Out of RAM? The Role of Virtual Memory

Comments
1 min read
When Your Computer Starts Digging Without You: The Story of Coin Miner Malware

When Your Computer Starts Digging Without You: The Story of Coin Miner Malware

2
Comments
1 min read
Spring Web MVC: The Java Waiter Behind Every Web Request

Spring Web MVC: The Java Waiter Behind Every Web Request

Comments
2 min read
Crashing with Clues: How Improper Error Handling Leaks Secrets

Crashing with Clues: How Improper Error Handling Leaks Secrets

Comments
3 min read
loading...