56 Articles in the category: Latest Published

Easy Clock With Seconds On Windows 11 - Byte.Yoga

Easy Clock With Seconds On Windows 11

This is the best method I could find to easily obtain for myself a precious and coveted semi-Windows-10-style clock on Windows 11.  Microsoft seems not to want us to know the time in seconds. I'm not...

Fix Repeating Keys (Chatter) On Mechanical Keyboards - Byte.Yoga

Fix Repeating Keys (Chatter) On Mechanical Keyboards

Mechanical keyboards have become more popular than ever. Yet many are prone to chatter —keystrokes registering more than once per keypress. That is, unwanted repeated letters as you type. The basic problem is that all mechanical...

Stuxnet and the Birth of Cyber War - Byte.Yoga

Stuxnet and the Birth of Cyber War

Most people are aware of the horrors of nuclear war. However there is much less awareness of the civilisation-ending potential of cyber war. Stuxnet is one of the most famous and sophisticated pieces of malware...

Byte.Yoga – A New Name for this Blog - Byte.Yoga

Byte.Yoga – A New Name for this Blog

Exciting News: Codewiz.au is Now Byte.yoga! Dear Readers, We're thrilled to announce a significant update that marks a new chapter for our blog. As part of our ongoing evolution and commitment to bringing you the best...

Learn Pentesting Basics in One Week? – Try This Challenge - Byte.Yoga

Learn Pentesting Basics in One Week? – Try This Challenge

To help with my Cybersecurity job search, I thought it would be interesting to see how much pentesting I can learn in a one-week period. I'll describe what I've done, starting from the basics. I'll...

Using Amazon AWS EC2 and Lucee to Host Legacy ColdFusion CFML Pages - Byte.Yoga

Using Amazon AWS EC2 and Lucee to Host Legacy ColdFusion CFML Pages

This page describes setting up a CFML server using Lucee (compatible with Adobe ColdFusion CFML pages) on Amazon's AWS EC2 cloud computing service. I was looking for a way to host example/demo versions of some of...

What it Was Like to Use the Internet in 1991 - Byte.Yoga

What it Was Like to Use the Internet in 1991

This page describes what it was like to use the Internet in 1991. This was before almost anyone in ordinary life had even heard of the Internet. Back then, it was almost a completely blank...

How to Make a 'Load More' Button in jQuery and AJAX - Byte.Yoga

How to Make a 'Load More' Button in jQuery and AJAX

This page shows the code for a "Load More" button, using jQuery and AJAX. It can be used to add any content to a <DIV> inside web page while the rest of the page is...

bWAPP – A Deliberately Buggy Web App to Practice Cybersecurity - Byte.Yoga

bWAPP – A Deliberately Buggy Web App to Practice Cybersecurity

This page describes how to install bee-box, a virtual Linux installation containing bWAPP, which is a deliberately buggy web application to practice pentesting and other cyber security skills on. From the bWAPP website: ...

Learning JavaScript and HTML Forms – Make a Simple Quiz - Byte.Yoga

Learning JavaScript and HTML Forms – Make a Simple Quiz

This page demonstrates a simple quiz written in JavaScript and HTML forms, made for a TAFE course in web and database development/design in 2001. This kind of quiz makes a good project to practice on when...

Bugster Rush – My 10 Year-Old Son's First Coding Project - Byte.Yoga

Bugster Rush – My 10 Year-Old Son's First Coding Project

My 10 year-old son made this game in the language Scratch in a few hours (with some help). Neither of us had coded in Scratch before, and I hadn't really seen it before at all. At...

Introduction to the Iptables Firewall Program for Linux - Byte.Yoga

Introduction to the Iptables Firewall Program for Linux

This page gives a quick introduction to the Iptables firewall software for Linux. More details will follow later... 1. How Iptables Works. The term “iptables” may refer to either the software firewall which is integrated...

Basics of SQL Injection Attacks - Byte.Yoga

Basics of SQL Injection Attacks

SQL injection attacks are carried out by inserting SQL code into a field where user input is accepted. If the user input is not correctly handled, this can result in the code executing by the...

Learn Encryption Concepts with the Historic Caesar Cipher - Byte.Yoga

Learn Encryption Concepts with the Historic Caesar Cipher

This is the first type of "secret spy code" I learned as a child, from a book called "The Spy's Guidebook". Years later, I learned that it's called a Caesar Cipher — named after Julius...