PinnedGetting Started with API FundamentalsAPIs simplify application development by abstracting the underlying implementation and exposing only the objects or actions needed by…Dec 21, 2022Dec 21, 2022
The UNIX cast of special characters: More Than Just PunctuationIn the world of UNIX and Linux command-line interfaces, a few ordinary looking characters wield extraordinary power. These aren’t just…Mar 28Mar 28
OverTheWire’s Bandit: A Hands-On Guide to Linux Commands and Security Fundamentals — Part 2(Level…A Hands-On Guide to Linux Commands and Security Fundamentals Part 1Mar 23Mar 23
Combating Phishing: A Comprehensive Guide for Security Analysts and EmployeesHello, a while ago I completed a Mastercard — Cyber Security job simulation on TheForage to tackle phishing email. I completed the tasks…Feb 22, 2025Feb 22, 2025
OverTheWire’s Bandit: A Hands-On Guide to Linux Commands and Security Fundamentals — Part 1 (Level…IntroductionSep 20, 2024Sep 20, 2024
Building an Ethical Hacking Playground at HomeI recently embarked on an exciting project: building my own homelab to dive deeper into ethical hacking. I am able to practice freely…Jul 11, 2024Jul 11, 2024
Published inFinTech and Tech NewsletterEmbracing Kiswahili: Exploring Unique Terminology in Kenyan API Sandbox DevelopmentAs a junior developer at PalmPay, I interacted with so many APIs and one fascinating trend was the use of unique Kiswahili words as names…Jul 13, 2023Jul 13, 2023
Published inFinTech and Tech NewsletterAnti Money Laundering (AML) and Combating the Financing of Terrorism (CFT) in FintechFinancial Technology uses technology to ease financial access for customers. Fintech in Kenya is among the fastest growing in Africa. In…May 3, 2023May 3, 2023