Published inLevel Up CodingMastering Protected Routes in NextJSMost of the times, you need to guard your web app, can’t hire a bouncer to do that hence Protect RoutesOct 8, 2024Oct 8, 2024
Published inLevel Up CodingAuthorization VS AuthenticationThe digital world is full of logins and sign-ups, and today we’re going to talk about the duo behind it all: Authentication and…Sep 27, 2024Sep 27, 2024
Published inLevel Up CodingShielding Your API Tokens And Payloads From HackersImplementing these strategies — HTTPS, JWTs, payload encryption, careful API key management, and OAuth — you’re building an army that can…Sep 24, 2024Sep 24, 2024
Let’s Clear That Cache: The Art of Clearing Cache After A Production DeploymentFive tried and tested strategies for your new deployment to work for all users always …..Sep 21, 2024Sep 21, 2024
Verifying Internally Deployed Proxy Smart ContractsIn-depth tutorial about, how to verify any proxy contract deployed internally from another smart contract on any EVM chain, with a working…Aug 31, 2024Aug 31, 2024
Calldata, Memory, and Storage in Solidity!Details of storing variables in solidity, how each one uses gas, and some practical tips to write solidity code better.Aug 3, 2024Aug 3, 2024
Everything You Need To Know About Closures In JavaScriptNot sure if your ex gave you closure, but let’s demystify closures in JS and ace those tricky interview questions.Jul 26, 2024Jul 26, 2024
Top 5 Ways To Use Console.log To Debug Like a ProSometimes, the simplest tool is the sharpest weapon in your arsenalJul 23, 2024Jul 23, 2024
Published inLevel Up CodingDeep Dive Into Memory Management in JavaScriptUnderstanding memory management in JavaScript is essential for building efficient applications. While JavaScript’s automatic garbage …Jan 16, 20241Jan 16, 20241