Avneesh Agarwalavneesh0612.hashnode.net·Jul 19, 2021Mastering Clerk authentication with the Next.js standard setupIn this tutorial, we will look at Clerk from top to bottom. I will show you how to use Clerk, customizing the sign-in, sign-up pages, adding social logins with GitHub and Facebook, keeping the users on your site, multi-session, and many more. So let’...Eleftheria Batsou and 2 others are discussing this3 people are discussing thisDiscuss·107 likes·1.1K readsauthenticationHey 👋 Thank you so much... I was finally able to do it 3
Gulshan Yadavyadavgulshan.hashnode.net·May 31, 2021#Flutter: Intro to basic widgets in FlutterAhoy, after learning something about Object-oriented Programming, let's get started with some cool stuff in Flutter. Open your Code-editors or open Dartpad Let's go! So first of all what is widgets ?? an application, or a component of an interface,...Discuss·63 likes·225 readsFlutterFlutter
Temitope Kolawolekolabdul.hashnode.net·Jun 26, 2022Getting started with The Node.js REPLJust like any other language, JavaScript with the help of the NodeJS runtime provides a REPL interface that can be accessed by running node from the command line without any scripts. REPL is an acronym that stands for Read Evaluate Print Loop Read -...Obinna Nneji and 1 other are discussing this2 people are discussing thisDiscuss·35 likes·877 readslogin
Pooja Vibhutepoojavibhute2803.hashnode.net·Apr 19, 2023Linux File Permissions and Access Control ListsFile Permission:- Linux File permission is core to the security model. Types of Ownership:- User:- The user is the owner of the file. By default, the person who creates the file is the owner of the file. Group:- It contains multiple users. Whatever...Discusslogin
Pooja Vibhutepoojavibhute2803.hashnode.net·Apr 19, 2023Advanced Shell ScriptingTask1:- You have to do the same using Shell Script i.e using either Loops or command with start day and end day variables using arguments - So Write a bash script to create a directory. sh when the script is executed with three given arguments (one i...Discuss·1 like·36 readslogin
Onah Tochukwutcodess.hashnode.net·Apr 8, 2023Mobile Users' Guide for Google ChromeBrowsers are used to get quick access to web pages with various kinds of stuff, like words, pictures, videos, and sounds. Google Chrome, Mozilla Firefox, Microsoft Edge, Apple Safari, and Opera are among the most popular browsers. They are viewable o...Discuss·10 likes·30 readslogin
Seth Phatsethphat.hashnode.net·Apr 7, 2023Highest security for LoginHi guys, Just a simple talk today for the Login security. It is actually the easiest thing of an Application, right? To be able to register and login into the system. But yeah, securities matter. You need to implement a bunch of things to ensure your...DiscussWeb Development
Luke Chidubemlukechidubem.hashnode.net·Mar 28, 2023JavaScript Switch StatementIn JavaScript, the switch statement is used to execute different code blocks based on different conditions. It is an alternative to a long chain of if/else statements. The basic syntax of the switch statement is as follows: Here, expression is the v...Discusslogin
Khushi Namdevkhushi28.hashnode.net·Mar 18, 2023What is Front-end and Back-end Developer?Frontend developers are developers of the UI of websites and applications through the use of HTML, CSS and JavaScript which allow users to interact with sites and apps. For eg. When we enter the URL and press enter then the page opens in the front e...Discusslogin
Luke Chidubemlukechidubem.hashnode.net·Mar 16, 2023Some CSS pseudo class selectorsCSS pseudo-class selectors are used to select elements based on their state or position in the document tree. These selectors start with a colon (:) and are followed by a keyword or identifier. Here are some examples of CSS pseudo-class selectors: 1)...Discuss·31 readslogin
Hasan MNhasanmn.hashnode.net·Mar 9, 2023Tracking User Activity on Linux: How to Access and Analyze Login User LogsLinux is a popular and widely-used operating system that is known for its security and stability. One of the features that make Linux secure is its ability to keep a record of user login events. Linux login user logs are essential for auditing and se...Discuss·41 readsLinux
Godtime Abeldontemple.hashnode.net·Feb 2, 2023A Comprehensive Guide on Middey ApplicationIf you're struggling with making payments, paying bills, or paying workers, there's a reliable fintech application called Middey that can help make your transactions easy and seamless. Allow me to guide you through the use of this application. Introd...Discusslogin
Sachin Waghmodesachinvishwas.hashnode.net·Mar 4, 2023Roadmap to becoming Azure AdministratorModule 1: Cloud Computing Fundamentals Understand the basics of cloud computing, including its benefits, service models, and deployment models. Familiarize yourself with concepts like virtualization, networking, security, and storage. Module 2: A...Discusslogin