Posts

How Real-Time Chat Applications Work (Socket.io Guide)

Image
Building Instant Communication Systems for Modern Web Applications Every developer eventually reaches a moment where a normal request and response system is not enough. At the beginning, building APIs with HTTP feels straightforward. A user sends a request, the server processes it, and a response comes back. This works perfectly for many systems like blogs, dashboards, or e-commerce platforms. But then you try to build something interactive. Maybe a chat application, a live notification system, or a collaborative tool where updates must appear instantly. And suddenly the traditional request–response model starts to feel slow and limited. Users expect messages to appear immediately. They expect typing indicators, online status, and instant updates without refreshing the page. At that moment, developers begin asking a new question: “How do real-time applications actually work?” That is exactly where WebSockets and Socket.io enter the picture. Understanding the P...

Mastering Prisma with PostgreSQL

Image
Mastering Prisma with PostgreSQL Building Clean and Scalable Backends the Modern Way 🚀 Every backend developer reaches a moment where things start to feel messy. At the beginning, writing SQL queries feels powerful. You manually control everything. You write SELECT, INSERT, and UPDATE queries and feel like you truly understand the database. But as your project grows, something changes. Queries start repeating. Logic spreads across files. Debugging becomes harder. You start asking yourself: “Is there a cleaner way to handle my database?” That’s exactly where Prisma and PostgreSQL come into the picture. Understanding PostgreSQL When we talk about databases in modern applications, one of the most trusted systems in the world is PostgreSQL. It is powerful, reliable, and used in real production systems across startups and enterprise-level platforms. PostgreSQL is like a large, well-organized warehouse that safely stores your application’s data. It handles transactions...

Write Better Code History: The Complete Guide to Git Commit Messages

Image
Clean Commits, Clear Communication, Stronger Collaboration Most of our day-to-day work in studies and software careers happens with code. When you work alone or with a team, Git becomes your memory. Every commit message is a small note to your future self and to other developers. Table of contents 1. Why Git Commit Messages Matter 2. What Is a Git Commit Message? 3. Basic Structure of a Good Commit Message 4. Common Commit Message Types 5. How to Write a Good Commit Message 6. Bad vs Good Commit Messages 7. Commit Message Best Practices 8. Why Good Commit Messages Improve Productivity 9. Simple Commit Message Checklist Why Git Commit Messages Matter Many beginners think commit messages are not important and write messages like: update fix bug final version test But after a few weeks or months, when you look back at your project, you will not understand what was chan...

Implement 'bcrypt' Password Verfication in Python

Image
Understanding bcrypt: Secure Password Hashing in Python Protecting user passwords is one of the most important parts of any authentication system. Instead of storing passwords as plain text, developers use hashing algorithms to convert passwords into unreadable strings. One of the most secure and widely used hashing algorithms today is bcrypt. In this article, I will explain what bcrypt is, how password hashing works, and how to implement bcrypt in Python with practical examples of registration and login. Table of contents 1. What bcrypt is 2. How Password Hashing Works 3. How to Implement bcrypt in Python     3.1. Install bcrypt     3.2. Hashing a password     3.3. Verifying the password 4. Practical Examples of Registration & Login     4.1. Registration Example     4.2. Login Example 5. Conclusio...

How to Hide Drives/Partitions in Windows 10/11: Explorer, Search, Permissions, and Hidden Shares

Image
The Practical Guide to Hiding Drives on Windows 10/11 (and How to Unhide Them) When you need a whole drive to “disappear,” Windows gives you several safe, reversible options. You can remove the drive letter, mount the volume only to a folder, stop Windows from auto‑assigning letters, set a “hidden” metadata flag, or even take a secondary disk fully offline. This guide walks through each method, with GUI and command options, what it hides, when to use it, and exactly how to bring everything back. Table of contents 1. Before you start: safety and scope 2. Way 01: Remove the drive letter (most common, reversible) 3. Way 02: Mount only to an NTFS folder (no drive letter) 4. Way 03: Prevent auto letters (nodefaultdriveletter + automount) 5. Way 04: Mark the volume “hidden” (metadata flag) 6. Way 05: Take the disk offline (strongest for secondary disks) 7. Optional: PowerShell equivalents 8. What not to touch (unle...

How to Hide Folders in Windows 10/11: Explorer, Search, Permissions, and Hidden Shares

Image
The Practical Guide to Hiding Folders on Windows 10/11 (and How to Unhide Them) Folders are where privacy and access control really matter. In this post, we’ll cover several ways to make a folder vanish from File Explorer, keep it out of Windows Search, block other local users from opening or even listing it, and a network trick to hide a share from browse lists. For each method, you’ll see what it hides from, how to do it, and how to undo it safely. By the end, you’ll know which option to use for tidying up, casual privacy, or stricter local control. Table of contents 1. Before you start: reveal hidden items 2. Way 01: Hidden attribute (and optionally its contents) 3. Way 02: Super hidden (System + Hidden) 4. Way 03: Hide from Windows Search (indexer) 5. Way 04: Hide from other local users (permissions/ACLs) 6. Way 05: Hide a shared folder name (network) 7. Which method should you use? 8. Pro tip: hiding ≠ protecting 9. Wrap up (and what’s next) Before you ...

How to Hide Files in Windows 10/11: Explorer, Search, Permissions, and NTFS Streams

Image
The Practical Guide to Hiding Files on Windows 10/11 (and How to Unhide Them) If you just want a file to disappear from casual view, Windows gives you a few handy levers, from a quick "Hidden" flag to deeper tricks like NTFS alternate data streams. In this first post of a 3‑part series, I’ll cover simple, reliable ways to hide a file from File Explorer, Search, or other local users, and how to reverse every change. We’ll also call out what each method does (and doesn’t) hide. Table of contents 1. Before you start: how to see hidden things again 2. Way 01: Quick and simple (the Hidden attribute) 3. Way 02 - Super-hidden (mark it as System + Hidden) 4. Way 03: Hide from Windows Search (the indexer) 5. Way 04: Hide from other local users with permissions (ACLs) 6. Way 05: Bonus (advanced) - hide data inside an NTFS Alternate Data Stream 7. Which method should you pick? 8. Important: hiding ≠ protecting 9. Wrap up (and what’s next) Before you...