<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Kiran Sethumadhavan</title>
    <description>The latest articles on DEV Community by Kiran Sethumadhavan (@kiransethu46).</description>
    <link>https://dev.to/kiransethu46</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F545304%2Fb1189796-f800-4e16-a619-e7f814a97dbc.jpeg</url>
      <title>DEV Community: Kiran Sethumadhavan</title>
      <link>https://dev.to/kiransethu46</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/kiransethu46"/>
    <language>en</language>
    <item>
      <title>WOOO</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Mon, 26 Jan 2026 16:02:57 +0000</pubDate>
      <link>https://dev.to/kiransethu46/wooo-1o4e</link>
      <guid>https://dev.to/kiransethu46/wooo-1o4e</guid>
      <description>&lt;p&gt;hii GQE&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>beginners</category>
      <category>ai</category>
    </item>
    <item>
      <title>wwww</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Sat, 24 Jan 2026 16:10:00 +0000</pubDate>
      <link>https://dev.to/kiransethu46/wwww-2hen</link>
      <guid>https://dev.to/kiransethu46/wwww-2hen</guid>
      <description>&lt;p&gt;Hello 😝&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>ai</category>
    </item>
    <item>
      <title>Top 50 Linux Commands You Must Know as a Regular User</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Fri, 05 Nov 2021 05:08:14 +0000</pubDate>
      <link>https://dev.to/kiransethu46/top-50-linux-commands-you-must-know-as-a-regular-user-9bo</link>
      <guid>https://dev.to/kiransethu46/top-50-linux-commands-you-must-know-as-a-regular-user-9bo</guid>
      <description>&lt;p&gt;The top 50 Linux Commands You Must Know as a Regular User are&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;ls - view contents of directory (list)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;pwd - path of the current directory&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;cd -  change directory&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;mkdir - make new directory &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;mv - move files / rename files&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;cp - copy files &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;rm - remove files&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;touch - create blank new file&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;rmdir - delete directory&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;cat - list content of file to terminal&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;clear - clear terminal window&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;echo - move data into a file&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;less - Read text file one screen at a time&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;man - show manual of Linux commands &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;sudo - enables you to perform tasks that require administrative or root permissions&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;top - task manager in terminal&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;tar - used to archive multiple files into a tarball&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;grep - used to searching words in specific files&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;head - view first lines of any text file&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;tail - view last lines of any text file&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;diff - compares the contents of two files line by line&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;kill - used for killing unresponsive program&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;jobs - display all current jobs along with their statuses&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;sort - is a command line utility for sorting lines of text files &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;df - info about system disk&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;du - check how much space a file or directory takes&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;zip - to compress your files into a zip archive &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;unzip - to extract the zipped files from a zip archive&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;ssh - a secure encrypted connection between two hosts over and insecure network&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;cal - shows calendar&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;apt - command line tool for interaction with packaging system&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;alias - custom shortcuts used to represent a command &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;w - current user info&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;whereis - used to locate the binary, source, manual page files&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;whatis - used to get one-line man page description&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;useradd - used to create a new user &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;passwd - used to changing password of current user&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;whoami - print current user &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;uptime - print current time when machine starts &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;free - print free disk space info&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;history - print used commands history&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;uname - print detailed information about your Linux system&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;ping - to check connectivity status to a server&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;chmod - to change permissions of files and directories &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;chown - to change ownership of files and directories&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;find - using find searches for files and directories&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;locate - used to locate a file, just like the search command in Windows &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;ifconfig - print ip address stuff&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;ip a - similar to ifconfig but shortest print&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;finger - gives you a short dump of info about a user&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Ask Cyber Security related question on&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://discourse.heeraj.com/" rel="noopener noreferrer"&gt;https://discourse.heeraj.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Join my telegram Group to know about latest Ethical hacking news and tools more than 300 members I have big plans for you &lt;br&gt;
Join Now&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>beginners</category>
      <category>computerscience</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>How to become a Pentester</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Fri, 05 Nov 2021 04:22:55 +0000</pubDate>
      <link>https://dev.to/kiransethu46/how-to-become-a-pentester-2pjg</link>
      <guid>https://dev.to/kiransethu46/how-to-become-a-pentester-2pjg</guid>
      <description>&lt;p&gt;𝙒𝙝𝙖𝙩 𝙞𝙨 𝙖 𝙥𝙚𝙣𝙩𝙚𝙨𝙩𝙚𝙧&lt;/p&gt;

&lt;p&gt;“A Pentester is someone who helps a business test their security posture through a structured attack simulation with a predefined and agreed scope, this is referred to as a penetration test. They help businesses see their vulnerabilities from an attacker’s perspective to highlight the impact of successful exploitation, they will also provide the necessary remediation to mitigate those vulnerabilities."&lt;/p&gt;

&lt;p&gt;𝙒𝙝𝙖𝙩 𝙖𝙧𝙚 𝙩𝙝𝙚 𝙨𝙠𝙞𝙡𝙡𝙨 𝙧𝙚𝙦𝙪𝙞𝙧𝙚𝙙?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Solid understanding of all IT fundamentals (Networking Included).&lt;/li&gt;
&lt;li&gt;In depth Knowledge of administering Windows, MacOS and Linux operating systems.&lt;/li&gt;
&lt;li&gt;Basic understanding of Web servers and their technologies&lt;/li&gt;
&lt;li&gt;Basic understanding of Database servers and their technologies&lt;/li&gt;
&lt;li&gt;Basic understanding of Application development&lt;/li&gt;
&lt;li&gt;Basic understanding of Mobile Application development&lt;/li&gt;
&lt;li&gt;Expert in Report writing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;𝙒𝙝𝙮 𝙖𝙧𝙚 𝙩𝙝𝙚𝙨𝙚 𝙨𝙠𝙞𝙡𝙡𝙨 𝙧𝙚𝙦𝙪𝙞𝙧𝙚𝙙?&lt;/p&gt;

&lt;p&gt;Penetration testing mainly involves identifying vulnerabilities. Attempting to exploit some of them to demonstrate potential impact may be possible depending on the project. You will also need to portray them in a non-technical way to stakeholders and then make recommendations on fixes. To do this accurately and quickly, in-depth knowledge of as much as possible is required. Where knowledge doesn't exist, a penetration tester can acquire it quickly and efficiently. Penetration testing is a vital part of an organisational security plan, however, the output needs to be aligned with business needs. Being able to understand this need and scope it appropriately can have a drastic effect on the career progression of a penetration tester. When studying ensure you have a firm grasp on all of the concepts and invest time in learning how you, as an individual, absorb information quickly.&lt;/p&gt;

&lt;p&gt;𝗥𝗲𝗰𝗼𝗺𝗺𝗲𝗻𝗱𝗲𝗱 𝘁𝗿𝗮𝗶𝗻𝗶𝗻𝗴&lt;/p&gt;

&lt;p&gt;𝙄𝙏 𝙁𝙪𝙣𝙙𝙚𝙢𝙚𝙣𝙩𝙖𝙡𝙨&lt;/p&gt;

&lt;p&gt;CISCO Netacad &lt;a href="https://www.netacad.com/" rel="noopener noreferrer"&gt;https://www.netacad.com/&lt;/a&gt;&lt;br&gt;
Professor Messer - &lt;a href="https://lnkd.in/gF7QqZDj" rel="noopener noreferrer"&gt;https://lnkd.in/gF7QqZDj&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;𝙄𝙣𝙩𝙧𝙤𝙙𝙪𝙘𝙩𝙞𝙤𝙣 𝙩𝙤 𝙥𝙚𝙣𝙩𝙚𝙨𝙩𝙞𝙣𝙜&lt;/p&gt;

&lt;p&gt;&lt;a href="https://ine.com/" rel="noopener noreferrer"&gt;https://ine.com/&lt;/a&gt; - The eJPT free course, overall best foundation cert in the field.&lt;/p&gt;

&lt;p&gt;𝙋𝙚𝙣𝙩𝙚𝙨𝙩𝙞𝙣𝙜 𝙋𝙧𝙖𝙘𝙩𝙞𝙘𝙖𝙡 𝙩𝙧𝙖𝙞𝙣𝙞𝙣𝙜&lt;/p&gt;

&lt;p&gt;TCM Academy - &lt;a href="https://lnkd.in/dWRhH_NX" rel="noopener noreferrer"&gt;https://lnkd.in/dWRhH_NX&lt;/a&gt;&lt;br&gt;
TryHackMe - &lt;a href="https://tryhackme.com/" rel="noopener noreferrer"&gt;https://tryhackme.com/&lt;/a&gt;&lt;br&gt;
HackThebox - &lt;a href="https://lnkd.in/d-zvvHGN" rel="noopener noreferrer"&gt;https://lnkd.in/d-zvvHGN&lt;/a&gt;&lt;br&gt;
Virtual Hacking Labs - &lt;a href="https://lnkd.in/d9PQR9UK" rel="noopener noreferrer"&gt;https://lnkd.in/d9PQR9UK&lt;/a&gt;&lt;br&gt;
OSCP Prep - &lt;a href="https://lnkd.in/eaUgBjK" rel="noopener noreferrer"&gt;https://lnkd.in/eaUgBjK&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;𝙒𝙚𝙗 𝘼𝙥𝙥𝙡𝙞𝙘𝙖𝙩𝙞𝙤𝙣 𝙋𝙚𝙣𝙩𝙚𝙨𝙩𝙞𝙣𝙜&lt;/p&gt;

&lt;p&gt;OWASP - &lt;a href="https://lnkd.in/gKT8qBq" rel="noopener noreferrer"&gt;https://lnkd.in/gKT8qBq&lt;/a&gt;&lt;br&gt;
Portswigger Web security academy - &lt;a href="https://lnkd.in/dGbVHbN" rel="noopener noreferrer"&gt;https://lnkd.in/dGbVHbN&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;𝗔𝗱𝗱𝗶𝘁𝗶𝗼𝗻𝗮𝗹 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻&lt;/p&gt;

&lt;p&gt;Public Pentest Reports - &lt;a href="https://lnkd.in/eYV-Aku" rel="noopener noreferrer"&gt;https://lnkd.in/eYV-Aku&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ask Cyber Security related question on&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://discourse.heeraj.com/" rel="noopener noreferrer"&gt;https://discourse.heeraj.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Join my telegram Group to know about latest Ethical hacking news and tools more than 270 members I have big plans for you&lt;/strong&gt; &lt;br&gt;
&lt;strong&gt;Join Now&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ctf</category>
      <category>programming</category>
      <category>beginners</category>
      <category>webdev</category>
    </item>
    <item>
      <title>How to solve CTF ☠️ (Capture_the_flags)</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Sun, 31 Oct 2021 14:37:18 +0000</pubDate>
      <link>https://dev.to/kiransethu46/how-to-solve-ctf-capturetheflags-17e</link>
      <guid>https://dev.to/kiransethu46/how-to-solve-ctf-capturetheflags-17e</guid>
      <description>&lt;p&gt;Challenge types&lt;/p&gt;

&lt;p&gt;Jeopardy style CTFs challenges are typically divided into categories. I'll try to briefly cover the common ones.&lt;/p&gt;

&lt;p&gt;Cryptography - Typically involves decrypting or encrypting a piece of data&lt;/p&gt;

&lt;p&gt;Steganography - Tasked with finding information hidden in files or images&lt;/p&gt;

&lt;p&gt;Binary - Reverse engineering or exploiting a binary file&lt;/p&gt;

&lt;p&gt;Web - Exploiting web pages to find the flag&lt;/p&gt;

&lt;p&gt;Pwn - Exploiting a server to find the flag&lt;/p&gt;

&lt;p&gt;Where do I start?&lt;/p&gt;

&lt;p&gt;If I managed to pique your curiosity, I've compiled a list of resources that helped me get started learning. CTF veterans, feel free to add your own resources in the comments below!&lt;/p&gt;

&lt;p&gt;Learning&lt;/p&gt;

&lt;p&gt;&lt;a href="http://ctfs.github.io/resources/" rel="noopener noreferrer"&gt;http://ctfs.github.io/resources/&lt;/a&gt; - Introduction to common CTF techniques such as cryptography, steganography, web exploits (Incomplete)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://trailofbits.github.io/ctf/forensics/" rel="noopener noreferrer"&gt;https://trailofbits.github.io/ctf/forensics/&lt;/a&gt; - Tips and tricks relating to typical CTF challenges/scenarios&lt;/p&gt;

&lt;p&gt;&lt;a href="https://ctftime.org/writeups" rel="noopener noreferrer"&gt;https://ctftime.org/writeups&lt;/a&gt; - Explanations of solutions to past CTF challenges&lt;/p&gt;

&lt;p&gt;Resources&lt;/p&gt;

&lt;p&gt;&lt;a href="https://ctftime.org" rel="noopener noreferrer"&gt;https://ctftime.org&lt;/a&gt; - CTF event tracker&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/apsdehal/awesome-ctf" rel="noopener noreferrer"&gt;https://github.com/apsdehal/awesome-ctf&lt;/a&gt; - Comprehensive list of tools and further reading&lt;/p&gt;

&lt;p&gt;Tools (That I use often)&lt;/p&gt;

&lt;p&gt;binwalk - Analyze and extract files&lt;/p&gt;

&lt;p&gt;burp suite - Feature packed web penetration testing framework&lt;/p&gt;

&lt;p&gt;stegsolve - Pass various filters over images to look for hidden text&lt;/p&gt;

&lt;p&gt;GDB - Binary debugger&lt;/p&gt;

&lt;p&gt;The command line :)&lt;/p&gt;

&lt;p&gt;Practice&lt;/p&gt;

&lt;p&gt;Many of the "official" CTFs hosted by universities and companies are time-limited competitions. There are many CTFs however that are online 24/7 that can be used as practice and learning tools. Here are some that I found to be friendly for beginners.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://ctflearn.com" rel="noopener noreferrer"&gt;https://ctflearn.com&lt;/a&gt; - A collection of various user-submitted challenges aimed towards newcomers&lt;/p&gt;

&lt;p&gt;&lt;a href="https://overthewire.org/wargames/" rel="noopener noreferrer"&gt;https://overthewire.org/wargames/&lt;/a&gt; - A series of progressively more difficult pwn-style challenges. (Start with the bandit series)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://2018game.picoctf.com/" rel="noopener noreferrer"&gt;https://2018game.picoctf.com/&lt;/a&gt; - Yearly time-limited CTF now available to use as practice&lt;/p&gt;

&lt;p&gt;Conclusion&lt;/p&gt;

&lt;p&gt;CTF is a great hobby for those interested in problem-solving and/or cyber security. The community is always welcoming and it can be a lot of fun tackling challenges with friends. &lt;/p&gt;

&lt;p&gt;Thank you for reading!&lt;br&gt;
Happy Hacking ☠️&lt;/p&gt;

&lt;p&gt;Listen to my favorite Lofi music Tracks&lt;br&gt;
&lt;a href="https://www.youtube.com/watch?v=_C12AC2Cxn8" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=_C12AC2Cxn8&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ask Cyber Security related question on&lt;br&gt;
&lt;a href="https://discourse.heeraj.com/" rel="noopener noreferrer"&gt;https://discourse.heeraj.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Join my telegram Group to know about latest Ethical hacking news and tools more than 270 members I have big plans for you .....&lt;br&gt;
Join Now&lt;br&gt;
&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ctf</category>
      <category>programming</category>
      <category>beginners</category>
      <category>webdev</category>
    </item>
    <item>
      <title>How to Protect Yourself Against Phishing Pages ?</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Sun, 22 Aug 2021 02:58:47 +0000</pubDate>
      <link>https://dev.to/kiransethu46/how-to-protect-yourself-against-phishing-pages-17f3</link>
      <guid>https://dev.to/kiransethu46/how-to-protect-yourself-against-phishing-pages-17f3</guid>
      <description>&lt;p&gt;phishing is an equal opportunity threat, capable of showing up on desktops, laptops, tablets, and smartphones. Most Internet browsers have ways to check if a link is safe, but the first line of defence against phishing is your judgement. &lt;/p&gt;

&lt;p&gt;Train yourself to recognize the signs of phishing and try to practice safe computing whenever you check your email, read Facebook posts, or play your favourite online game.&lt;/p&gt;

&lt;p&gt;Once again, here are a few of the most important practices to keep you safe:&lt;/p&gt;

&lt;p&gt;• Don't open e-mails from senders you are not familiar with.&lt;/p&gt;

&lt;p&gt;• Don't ever click on a link inside of an e-mail unless you know exactly where it is going.&lt;/p&gt;

&lt;p&gt;• To layer that protection, if you get an e-mail from a source you are unsure of, navigate to the provided link manually by entering the legitimate website address into your browser.&lt;/p&gt;

&lt;p&gt;• Lookout for the digital certificate of a website.&lt;/p&gt;

&lt;p&gt;• If you are asked to provide sensitive information, check that the URL of the page starts with “HTTPS” instead of just “HTTP.” The “S” stands for “secure.”It's not a guarantee that a site is legitimate, but most legitimate sites use HTTPS because it's more secure. HTTP sites, even legitimate ones, are vulnerable to hackers.&lt;/p&gt;

&lt;p&gt;• If you suspect an e-mail isn't legitimate, take a name or some text from the message and put it into a search engine to see if any known phishing attacks exist using the same methods.&lt;/p&gt;

&lt;p&gt;• Mouse over the link to see if it's a legitimate link.&lt;/p&gt;

&lt;p&gt;As always, we recommend using some sort of anti-malware security software. Most cybersecurity tools can detect when a link or an attachment isn't what it seems, so even if you fall for a clever phishing attempt, you won't end up sharing your info with the wrong people.&lt;/p&gt;

&lt;p&gt;All Malwarebytes premium security products provide robust protection against phishing. They can detect fraudulent sites and stop you from opening them, even if you're convinced they're legitimate. You can even try Malwarebytes free before you buy. &lt;/p&gt;

&lt;p&gt;So stay vigilant, take precautions, and look out for anything phishy.&lt;/p&gt;

&lt;p&gt;Ask Cyber Security related question on&lt;br&gt;
&lt;a href="https://discourse.heeraj.com/" rel="noopener noreferrer"&gt;https://discourse.heeraj.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Join my telegram Group to know about latest Ethical hacking news and tools more than 300 members I have big plans for you .....&lt;br&gt;
Join Now&lt;br&gt;
&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>phishing</category>
      <category>programming</category>
      <category>webdev</category>
    </item>
    <item>
      <title>How to install nuclei in any linux ☠️</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Tue, 03 Aug 2021 04:55:30 +0000</pubDate>
      <link>https://dev.to/kiransethu46/how-to-install-nuclei-in-any-linux-eo1</link>
      <guid>https://dev.to/kiransethu46/how-to-install-nuclei-in-any-linux-eo1</guid>
      <description>&lt;p&gt;Nuclei is a fast and customisable web vulnerability scanner which will help you getting in low hanging web vulnerability &lt;/p&gt;

&lt;p&gt;First we need to install Go &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz3fjdhasbtwfgtcum70u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz3fjdhasbtwfgtcum70u.png" alt="image" width="800" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I always install my tools in /opt folder in linux . Its not neccessary you can clone the repo anywhere .&lt;br&gt;
git clone &lt;a href="https://github.com/projectdiscovery/nuclei.git" rel="noopener noreferrer"&gt;https://github.com/projectdiscovery/nuclei.git&lt;/a&gt; &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyjko28ckd559x3j5w6oo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyjko28ckd559x3j5w6oo.png" alt="image" width="794" height="177"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;cd nuclei/v2/cmd/nuclei/&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F154p10meufef7m75xguq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F154p10meufef7m75xguq.png" alt="image" width="452" height="80"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;go build . &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjhmxza09f7nqrpm6hdeg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjhmxza09f7nqrpm6hdeg.png" alt="image" width="650" height="258"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;now we have to move the file to bin folder so that we can access nuclei from anywhere &lt;br&gt;
mv nuclei /usr/local/bin/ &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkk99zkf4xciv3r1kc4qf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkk99zkf4xciv3r1kc4qf.png" alt="image" width="694" height="61"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we are ready to roll&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fynimmzjxtzhvpp084j42.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fynimmzjxtzhvpp084j42.png" alt="image" width="749" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Happy Hacking ☠️&lt;/p&gt;

&lt;p&gt;Listen to my favorite Lofi music Tracks &lt;br&gt;
&lt;a href="https://www.youtube.com/watch?v=_C12AC2Cxn8" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=_C12AC2Cxn8&lt;/a&gt;&lt;/p&gt;

</description>
      <category>kalilinux</category>
      <category>bugbounty</category>
      <category>tools</category>
      <category>ethicalhacking</category>
    </item>
    <item>
      <title>The most common myths about anonymity on the Internet</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Wed, 14 Jul 2021 18:36:15 +0000</pubDate>
      <link>https://dev.to/kiransethu46/the-most-common-myths-about-anonymity-on-the-internet-39cb</link>
      <guid>https://dev.to/kiransethu46/the-most-common-myths-about-anonymity-on-the-internet-39cb</guid>
      <description>&lt;p&gt;Browser and its TOR network&lt;/p&gt;

&lt;p&gt;It is considered a good tool for anonymity.&lt;/p&gt;

&lt;p&gt;When using this network and the browser, encrypted traffic passes through a chain of proxy servers that are independent of each other. It changes regularly and new proxies are used. Many people think that identifying the user and his data is unrealistic.&lt;/p&gt;

&lt;p&gt;But this is not the case. First, the last server sees the traffic in an unencrypted form. Secondly, the hardware of the computer, Canvas Fingerprint and other things are monitored. So yes, Thor enhances anonymity, but it is not a panacea.&lt;/p&gt;

&lt;p&gt;The next misconception is that the history of my requests is stored only by my browser and I can easily delete it.&lt;/p&gt;

&lt;p&gt;No, any search engine stores and remembers your queries. Has it ever happened that you google some product, and then you are haunted by its advertising? This is it. Google remembered what you were looking for and took advantage of it.&lt;/p&gt;

&lt;p&gt;The third myth is that I will turn on the proxy and be anonymous.&lt;/p&gt;

&lt;p&gt;First, the ISP sees that you are connecting to a specific proxy server. Therefore, if you are interested, it will not be difficult to track you. And if you don't connect, the provider will initially know and store your entire history of page visits, even if you later delete it from your computer.&lt;/p&gt;

&lt;p&gt;Fourth myth. Do you think that if you do not indicate your real name and surname on the Internet, no one will get to them? The answer is no.&lt;/p&gt;

&lt;p&gt;For example, many services now require a mobile phone number. And already on it it is not difficult to track you. You will say that the SIM is not registered in your name.&lt;/p&gt;

&lt;p&gt;But your phone number is kept in the contacts of your friends, acquaintances and relatives. Some of them have you signed by name and surname. Mom has you signed as "Son". And at least one of your contacts has a phone book synchronization with Google. Do you understand the connection?&lt;/p&gt;

&lt;p&gt;Well, the fifth myth is that if you turn off the geolocation in the smartphone, then they will not be able to track my location.&lt;/p&gt;

&lt;p&gt;First, you can still be tracked by your phone number with your mobile operator.&lt;br&gt;
Secondly, you can be easily tracked over the Wi-Fi network to which you connect.&lt;br&gt;
Well, and so on) In general, using a smartphone, you can forget about complete anonymity, unless you turn off all the functions there that make it a smartphone.&lt;/p&gt;

&lt;p&gt;Such things, guys. So be careful on the Internet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you want to Kick-start a career in Cyber Security and want to know how hackers hack in real life ☠️☠️&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Join Now and support  !!!&lt;br&gt;
275+ Members already Joined&lt;/p&gt;

&lt;p&gt;&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Have doubts in your mind hackers ?ask your doubts related to cybersecurity Now !!!!!!&lt;br&gt;
&lt;a href="https://discourse.heeraj.com/" rel="noopener noreferrer"&gt;https://discourse.heeraj.com/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tor</category>
      <category>darkweb</category>
      <category>anonymous</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Difference between TCP and UDP</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Sat, 26 Jun 2021 15:59:45 +0000</pubDate>
      <link>https://dev.to/kiransethu46/differnce-between-tcp-and-udp-763</link>
      <guid>https://dev.to/kiransethu46/differnce-between-tcp-and-udp-763</guid>
      <description>&lt;p&gt;&lt;strong&gt;Transmission Control Protocol (TCP)&lt;/strong&gt;&lt;br&gt;
Transmission Control Protocol (TCP) is connection-oriented, meaning once a connection has been established, data can be transmitted in two directions. TCP has built-in systems to check for errors and to guarantee data will be delivered in the order it was sent, making it the perfect protocol for transferring information like still images, data files, and web pages.&lt;br&gt;
But while TCP is instinctively reliable, its feedback mechanisms also result in a larger overhead, translating to greater use of the available bandwidth on your network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;User Datagram Protocol (UDP)&lt;/strong&gt;&lt;br&gt;
User Datagram Protocol (UDP) is a simpler, connectionless Internet protocol wherein error-checking and recovery services are not required. With UDP, there is no overhead for opening a connection, maintaining a connection, or terminating a connection; data is continuously sent to the recipient, whether or not they receive it. &lt;br&gt;
Although UDP isn’t ideal for sending an email, viewing a webpage, or downloading a file, it is largely preferred for real-time communications like broadcast or multitasks network transmission.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Differences between TCP and UDP&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol.&lt;br&gt;
The speed for TCP is slower while the speed of UDP is faster.&lt;br&gt;
TCP uses handshake protocols like SYN, SYN-ACK, ACK while UDP uses no handshake protocols.&lt;br&gt;
TCP does error checking and also makes error recovery, on the other hand, UDP performs error checking, but it discards erroneous packets.&lt;br&gt;
TCP has acknowledgment segments, but UDP does not have any acknowledgment segments.&lt;br&gt;
TCP is heavy-weight, and UDP is lightweight.&lt;br&gt;
TCP vs UDP Speed&lt;br&gt;
The reason for UDP’s superior speed over TCP is that its non-existent ‘acknowledgment’ supports a continuous packet stream. Since a TCP connection always acknowledges a set of packets (whether or not the connection is totally reliable), retransmission must occur for every negative acknowledgment where a data packet has been lost. &lt;br&gt;
But because UDP avoids the unnecessary overheads of TCP transport, it’s incredibly efficient in terms of bandwidth, and much less demanding of poor-performing networks, as well.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you want to Kick-start a career in Cyber Security and want to know how hackers hack in real life ☠️☠️&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Join Now and support  !!!&lt;br&gt;
250+ Members already Joined&lt;/p&gt;

&lt;p&gt;&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

</description>
      <category>node</category>
      <category>networking</category>
      <category>privacy</category>
      <category>networks</category>
    </item>
    <item>
      <title>Top 10 Chrome Extensions for Web Developers 🚀🚀</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Thu, 22 Apr 2021 06:16:04 +0000</pubDate>
      <link>https://dev.to/kiransethu46/top-10-chrome-extensions-for-web-developers-3n5i</link>
      <guid>https://dev.to/kiransethu46/top-10-chrome-extensions-for-web-developers-3n5i</guid>
      <description>&lt;p&gt;Have doubts in your mind hackers ?ask your doubts related to cybersecurity Now !!!!!!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://discourse.heeraj.com/" rel="noopener noreferrer"&gt;https://discourse.heeraj.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Listen to my favorite Lofi music Tracks &lt;br&gt;
&lt;a href="https://www.youtube.com/watch?v=_C12AC2Cxn8" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=_C12AC2Cxn8&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/colorzilla/bhlhnicpbhignbdhedgjhgdocnmhomnp" rel="noopener noreferrer"&gt;Colorzilla&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fscbzzkh9spk22z67lujy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fscbzzkh9spk22z67lujy.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;ColorZilla is a css tool from which you can get a color reading from any point in your browser, quickly adjust this color and paste it into another program. And it can do so much more..&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/lighthouse/blipmdconlkpinefehnmjammfjpmpbjk" rel="noopener noreferrer"&gt;LighHouse&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjr0fwibks4r05igsf06y.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjr0fwibks4r05igsf06y.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Lighthouse is an open-source, automated tool for improving the performance, quality, and correctness of your web apps. &lt;/p&gt;

&lt;p&gt;When auditing a page, Lighthouse runs a barrage of tests against the page, and then generates a report on how well the page did. From here you can use the failing tests as indicators on what you can do to improve your app.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/wappalyzer/gppongmhjkpfnbhagpmjfkannfbllamg?hl=en" rel="noopener noreferrer"&gt;Wappalyzer &lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frxdomnbwh34yqma0fbu9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frxdomnbwh34yqma0fbu9.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Wappalyzer is a technology profiler that shows you what websites are built with. Find out what CMS a website is using, as well as any framework, ecommerce platform, JavaScript libraries and many more.&lt;/p&gt;

&lt;p&gt;Wappalyzer is more than a CMS detector or framework detector: it uncovers more than a thousand technologies in dozens of categories such as programming languages, analytics, marketing tools, payment processors, CRM, CDN and others.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/fake-filler/bnjjngeaknajbdcgpfkgnonkmififhfo?hl=en" rel="noopener noreferrer"&gt;FakeFiller&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fac6gsqf55skarkmwxf0s.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fac6gsqf55skarkmwxf0s.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Fake Filler is the form filler to fill all input fields on a page with randomly generated fake data. This productivity-boosting extension is a must for developers and testers who work with forms as it eliminates the need for manually entering values in fields.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/cssviewer/ggfgijbpiheegefliciemofobhmofgce" rel="noopener noreferrer"&gt;CSS Viewer&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbf6xhqjpwd7cesm3aaak.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbf6xhqjpwd7cesm3aaak.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;CSSViewer is a simple CSS properties viewer originally made by Nicolas Huon as a FireFox add-on (2006-2008).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/json-viewer/gbmdgpbipfallnflgajpaliibnhdgobh" rel="noopener noreferrer"&gt;Json Viewer&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvfwtj4vj0rb6sp9i6a1o.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvfwtj4vj0rb6sp9i6a1o.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The most beautiful and customizable JSON/JSONP highlighter that your eyes have ever seen. It is a Chrome extension for printing JSON and JSONP. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/react-developer-tools/fmkadmapgofadopljbjfkapdkoienihi" rel="noopener noreferrer"&gt;React Developer Tools &lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpnfxpz929h26r9xrftm8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpnfxpz929h26r9xrftm8.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Adds React debugging tools to the Chrome Developer Tools. React Developer Tools is a Chrome DevTools extension for the open-source React JavaScript library. It allows you to inspect the React component hierarchies in the Chrome Developer Tools.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/whatfont/jabopobgcpjmedljpbcaablpmlmfcogm" rel="noopener noreferrer"&gt;WhatFont&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffk0lakn6n7h3g2u4keg7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffk0lakn6n7h3g2u4keg7.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The easiest way to identify fonts on web pages. Firebug and Webkit Inspector are easy enough to use for developers. However, for others, this should not be necessary. With this extension, you could inspect web fonts by just hovering on them. It is that simple and elegant. It also detects the services used for serving the web fonts. Supports Typekit and Google Font API.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/redux-devtools/lmhkpmbekcpmknklioeibfkpmmfibljd" rel="noopener noreferrer"&gt;Redux Dev Tools&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsjsbi6i1vysex8vxn1e8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsjsbi6i1vysex8vxn1e8.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Redux DevTools for debugging application's state changes.&lt;br&gt;
The extension provides power-ups for your Redux development workflow. Apart from Redux, it can be used with any other architectures which handle the state.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://chrome.google.com/webstore/detail/open-in-vscode/pfakkjlkpobjeghlgipljkjmbgcanpji" rel="noopener noreferrer"&gt;Open in Vscode &lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fngl2bofb74b65j2d81b9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fngl2bofb74b65j2d81b9.jpg" alt="Alt Text" width="640" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Open Github and Gitlab links in VSCode. Just right click on any link to a file and select "Open in VSCode". You can also click on line links to open the file to the specific file.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you want to Kick-start a career in Cyber Security and want to know how hackers hack in real life ☠️☠️&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Join Now and support  !!!&lt;br&gt;
275+ Members already Joined&lt;/p&gt;

&lt;p&gt;&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>productivity</category>
      <category>javascript</category>
    </item>
    <item>
      <title>Top 10 AI projects for Resume</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Tue, 20 Apr 2021 11:14:49 +0000</pubDate>
      <link>https://dev.to/kiransethu46/top-10-ai-projects-for-resume-2gmk</link>
      <guid>https://dev.to/kiransethu46/top-10-ai-projects-for-resume-2gmk</guid>
      <description>&lt;p&gt;1 Jarvis AI&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/NZMTWBpLUa4"&gt;
&lt;/iframe&gt;
 &lt;/p&gt;

&lt;p&gt;2 Face Recognition + Attendence &lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/sz25xxF_AVE"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;3 Personal AI Trainer&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/5kaX3ta398w"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;4 Write in air &lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/QBGBnjIkRaw"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;5 Car Detection &lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/O3b8lVF93jU"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;6 Stock Detection &lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/QIUxPv5PJOY"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;7 Distance Detection &lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/mFLZkdH1yLE"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;8 Object Detection &lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/RFqvTmEFtOE"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;9 Hand Tracking &lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/NZde8Xt78Iw"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;10 Ball Tracker &lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/FN-YWTbVda8"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you want to Kick-start a career in Cyber Security and want to know how hackers hack in real life ☠️☠️&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Join Now and support us !!! &lt;br&gt;
200+ Members already Joined&lt;/p&gt;

&lt;p&gt;&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

</description>
      <category>python</category>
      <category>ai</category>
      <category>programming</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Top 10 React projects for Resume 🚀🚀</title>
      <dc:creator>Kiran Sethumadhavan</dc:creator>
      <pubDate>Sun, 18 Apr 2021 15:30:15 +0000</pubDate>
      <link>https://dev.to/kiransethu46/top-5-javascript-projects-for-resume-8d6</link>
      <guid>https://dev.to/kiransethu46/top-5-javascript-projects-for-resume-8d6</guid>
      <description>&lt;ol&gt;
&lt;li&gt;Facebook Clone&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/B-kxUMHBxNo"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Instagram Clone
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/f7T48W0cwXM"&gt;
&lt;/iframe&gt;
&lt;/li&gt;
&lt;li&gt;Whatsapp Clone
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/pUxrDcITyjg"&gt;
&lt;/iframe&gt;
 &lt;/li&gt;
&lt;li&gt;Linkedin Clone
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/QaYts9sPmcY"&gt;
&lt;/iframe&gt;
&lt;/li&gt;
&lt;li&gt;Amazon Clone
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/RDV3Z1KCBvo"&gt;
&lt;/iframe&gt;
&lt;/li&gt;
&lt;li&gt;Spotify Clone
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/pnkuI8KXW_8"&gt;
&lt;/iframe&gt;
&lt;/li&gt;
&lt;li&gt;Netflix Clone
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/1TCw9wO1neA"&gt;
&lt;/iframe&gt;
&lt;/li&gt;
&lt;li&gt;Hotstar + Disney Clone
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/4pjpHUN28kk"&gt;
&lt;/iframe&gt;
&lt;/li&gt;
&lt;li&gt;Google Drive clone
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/ljuCH6_jrYE"&gt;
&lt;/iframe&gt;
 &lt;/li&gt;
&lt;li&gt;Signal Clone 
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/MJzmZ9qmdaE"&gt;
&lt;/iframe&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Do you want to Kick-start a career in Cyber Security and want to know how hackers hack in real life ☠️☠️&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Join Now 200+ Members already Joined &lt;/p&gt;

&lt;p&gt;&lt;a href="https://t.me/infosecbugbounty" rel="noopener noreferrer"&gt;https://t.me/infosecbugbounty&lt;/a&gt;&lt;/p&gt;

</description>
      <category>javascript</category>
      <category>devops</category>
      <category>programming</category>
      <category>codenewbie</category>
    </item>
  </channel>
</rss>
