All Articles
A collection of my thoughts, tutorials, and insights on web development.28 articles published.
DESTRUCTURING ARRAYS AND OBJECTS
Working with React framework can be very exciting and challenging at the same time. The complexities of the approach and the methods used make it difficult to grasp. It's even more difficult for one with just a basic javascript idea
REACT COMPONENTS LIFE CYCLE I
Each component in React undergoes a lifecycle period starting from the period of initialization(mounting), changes(updating and error handling), and termination(unmounting). These lifecycles can be manipulated according to the demands of the project. Therefore, there is no strict adherence or implementation of a particular integration of these lifecycle methods
REACT COMPONENTS LIFE CYCLE II
Earlier, we focused on understanding how React component lifecycles work in a general view and we had only concentrated on one of the lifecycles which is the Mounting method, and the various phases therein. We shall explore yet another of these lifecycle methods, which is the Updating method and its different phases
THE THIN LINE BETWEEN GOD-COMPLEX VERSUS IMPOSTER SYNDROME
Imposter syndrome and god-complex are two sides of a coin, they are two extremes, they are equal and opposites and they don't affect us solely, but also our relationships at all levels
WIRELESS NETWORKING PART I
In place of a physical set of wires running between network nodes, wireless networks use either radio waves or beams of infrared light to communicate with each other
WIRELESS NETWORKING PART II
Most wireless networks use radio frequency (RF) technologies, particularly the 802.11 (Wi-Fi) standards. Other standards, such as infrared, Bluetooth, and cellular, are much smaller in today’s market. Radiofrequency is the part of the electromagnetic spectrum used for radio communication.
THE INTERNET PART I
The internet is millions and millions of computers all joined together to form the largest network on earth. To keep everything running smoothly, the internet is broken down into groups called tiers.
THE INTERNET PART II
Connecting a single computer to the internet is easy, if you’re using wireless, connect to the wireless box using the provided information, if you are using wired, run a cable from whatever type of box provided to the computer
VIRTUALIZATION PART I
This is a process where a single host computer running specialized software can create environments (saved in separate files) that replicate other computers. These environments are called Virtual Machines (VMs) or guests.
VIRTUALIZATION PART II
Once the new guest virtual machine is created, the installation of a guest operating system follows. You need to install an operating system on that virtual machine.
MOBILE DEVICES PART I
Most modern mobile devices fall into one of a few categories including smartphones tablets and wearable technology which all have similar features and capabilities.
MOBILE DEVICES PART II
Most mobile devices as we saw earlier, run either Apple iOS or Google Android. We shall discuss their development and implementation models as well as some of their major features, and how their app stores work.
TROUBLESHOOTING MOBILE DEVICE ISSUES PART I
Modern mobile operating systems (OSs) have tons of configurable settings as do many of the apps installed on them. Be attentive to problems that point to configuration issues.
TROUBLESHOOTING MOBILE DEVICE ISSUES PART II
Device makers originally designed mobile devices to be flexible by nature because they are more useful that way. But network attacks can exploit such openness.
SECURING COMPUTERS PART I
Securing computers requires both strategy and proper tactics. Strategic reasons mean understanding the threat from unauthorized access to local machines as well as threats posed
SECURING COMPUTERS PART II
There are four concepts and technology areas to cover: Access control, Data classification and compliance, Licensing, and Incident Response.
SECURING COMPUTERS PART III
These are devices or software that protect an internal network from unauthorized access to and from the internet at large. They use a number of methods to protect networks like hiding IP addresses and blocking TCP/IP ports.
OPERATIONAL PROCEDURES
This encompasses a lot for any organization, ranging from best practices for safety to dealing with environmental factors, from company policies for handling prohibited contents or activities to proper communication techniques and professionalism.
PURPOSE OF COMPUTER NETWORKS
The reason for linking computers in a network is as important as the reason why people network. People networks are necessary to accomplish tasks that might be so burdensome to be completed by a single individual. This also applies to computers.
OSI REFERENCE MODEL
The International Organization for Standardization (ISO) defined the Open Systems Interconnection (OSI) reference model to standardize the networking of devices from different vendors.
TCP/IP PROTOCOL SUITE
TCP/IP is the most widely used protocol suite for computer networks. It is the foundation of the internet and is used for communication between devices on a network. TCP/IP stands for Transmission Control Protocol/Internet Protocol.
DATA ENCAPSULATION
Network models, TCP/IP inclusive, use encapsulation and very clearly defined interfaces to achieve independence of layer functionalities. The independence of layer functionality is crucial as it
BINARY, HEXADECIMAL, AND DECIMAL NUMBERING SYSTEMS
Several networking features and protocols rely on binary and hexadecimal numbers to code bit maps, subnet masks, and network addresses. So understanding numbering systems is vital because they affect many networking features and protocols.
LOCAL AREA NETWORKS (LANs)
LANs interconnect host devices over short distances. They can support high speed and a fairly large bandwidth. LAN traffic can be controlled with bridges and switches. Hubs also interconnect hosts in LAN. Switches are preferable over hubs in LANs as switches limit collision domains.
SAFEGUARDING YOUR ONLINE IDENTITY: WORTH IT?
In the digital age, safeguarding your online identity is crucial. With the increasing amount of personal information shared online, it's essential to take steps to protect yourself from identity theft, cyberbullying, and other online threats. But is it worth it? Let's explore the importance of safeguarding your online identity and the benefits it can bring.
SECURE YOUR WHATSAPP, FACEBOOK AND INSTAGRAM ACCOUNTS WITH MFA
Multi-factor authentication (MFA) is a security measure that requires users to provide multiple forms of verification before gaining access to their accounts. This can include something they know (like a password), something they have (like a phone), or something they are (like a fingerprint). Enabling MFA on your WhatsApp, Facebook, and Instagram accounts can significantly enhance the security of your online presence and protect you from unauthorized access.
WIDE-AREA NETWORKS (WANs)
Wide-area networks span long distances and interconnect MANs, CANs, and LANs. Telecommunication companies build and maintain WANs. Telecom companies lease bandwidth, or dedicated connections to other companies that need to interconnect their LANs over long distances. Telecom companies that provide shared bandwidth or dedicated connections over their WANs are called Service Providers.
WIRELESS NETWORKS
Wireless networks are short or medium-range networks that connect host devices using airwaves (radio) instead of cables. Wireless connections exist in a large variety of applications both for LAN and WAN.