About:

Evgenii Pendragon's technical blog covers software development, AI, and cybersecurity, providing expert insights on modern technologies and cybersecurity practices.

Website:

Specializations:

Subscribe to RSS:
The blog post discusses MidWord.com, a word-guessing game developed by Mina Naguib, where players use a binary search strategy to guess a secret word based on hints provided by the game. The author shares their experience and expl...
Choosing the right programming language is crucial for software security, emphasizing the need for built-in safety features and early integration of security in the development process.
The post discusses the importance of good documentation in software development and introduces Mermaid.js, a JavaScript-based tool that allows developers to create diagrams and charts using text. It highlights the advantages of us...
The author discusses their change of opinion regarding the use of robots.txt to control web crawlers and AI scraping content without consent. They explain the Robots Exclusion Protocol, its purpose, and the implications of allowin...
The article discusses the impact of AI on software development, highlighting the divide between those who fear job loss and those who are skeptical of AI's capabilities. It examines what AI excels at, such as generating code quick...
The post explains the XDG Base Directory Specification, which is a set of guidelines established by the Cross-Desktop Group (Freedesktop.org) to standardize file storage and data exchange across different Linux-based systems. It d...
The blog post discusses the implementation of an AWS Lambda function using Go to convert images into ASCII art. It covers the advantages of using Go for serverless functions, including speed and cost-effectiveness. The author deta...
The author discusses customizing their tmux and other configuration files, leading to the creation of a GitHub repository for managing these files. They detail the process of developing a Bash script to automate the installation o...
The blog post discusses the author's experience with tmux, a terminal multiplexer that allows users to manage multiple terminal sessions within a single window. The author shares insights on customizing tmux to improve its user in...
The Luhn Algorithm is a simple yet effective checksum method used for validating numbers like credit cards, showcasing ingenuity in its design and implementation.
Claude Code should not replace traditional linters, as the latter are more reliable and deterministic for code quality assurance.
The author discusses their experience with modifying the robots.txt file to block all crawlers from their website, which inadvertently caused issues with LinkedIn post previews and engagement. After investigating, they discovered ...
The blog post details the author's journey in learning about blockchain technology by building a simple blockchain application using the Go programming language. It explains the structure of the project, including the data structu...
The author discusses the motivation behind starting a blog focused on tech, software development, cybersecurity, AI, business, and book reviews. They emphasize the importance of building a personal brand associated with trust and ...