MakerDAO 101 for Coders – How DeFi Lending and Borrowing Works

This is in continuation of the first part of our DeFi series. πŸ’‘ Abstract: In this article, we will see how decentralized lending and borrowing work. It starts with comparing centralized finance (CeFi) with decentralized finance (DeFi) lending and borrowing. You’ll then learn about the most important Ethereum based DeFi decentralized apps (dapps) for lending … Read more

Top 21 Developer Jobs and Career Paths in 2023

This article will go over the top 21 most attractive developer jobs in the decade to come. Note that the purpose of this article is to look forward to the future rather than looking backward into the past. The future is inherently uncertain but we did everything we could (as you’ll see) to remain objective … Read more

Polygon for Developers – A Simple Guide with Video

What are Polygon and MATIC all about and why is another blockchain needed? You will find answers to these questions in this article. The article starts with problems plaguing Ethereum, workable solutions to the problem, and then dives into more details of the Polygon network, its history, tokenomics, and an overview of the Polygon SDK. … Read more

Top 14 Profitable Career Paths for Python Coders (2023)

Is Python still an attractive niche to be in as a coder? And what about in the decade to come given that the programming industry undergoes rapid changes? This article will give you answers to those questions. In short, the top 14 profitable career paths for Python coders are: After reading this article, you’ll have … Read more

Smart Contract Replay Attack in Solidity

This is part 8 and a continuation of the Smart Contract Security Series. Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack This post provides insights into the replay attack in blockchains. As per the wiki, a replay attack is a valid data … Read more

Top 5 Finance Jobs for Coders in 2024

Coders are often skilled in analytical and creative areas. It doesn’t surprise that with those skills, they often fare well in business and investing too. Examples of skilled coders who are also skilled in finance are Bill Gates, Mark Zuckerberg, Marc Andreessen, and myriads more. Those coders with a strong interest in finance became billionaires! … Read more

Top 9 Crypto Jobs for Coders in 2023

Blockchains penetrate into every single field in computer science. Fields such as borrowing, lending, web3, crypto gaming, NFTs, DAOs, trading — to mention just a few — experience a rapid growth in recent years. Both developers and users flock to decentralized, open, permissionless protocols: Blockchains. The exploding interest in Blockchain development brings opportunity to coders … Read more

Smart Contract Randomness or ReplicatedLogic Attack

This is part 7 and a continuation of the Smart Contract Security Series. Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack In this tutorial, the randomness attack or also called replicated logic attack is analyzed. The problem in Solidity contracts is finding … Read more

Top 11 DeFi Articles to Get Started in Crypto

DeFi (or β€œdecentralized finance”) is a term used to refer to financial services transacted on public blockchains. DeFi is permissionless and open to all. Transactions are routed through a decentralized network or blockchain. DeFi applications provide many of the same services provided by traditional banks such as lending, borrowing, trading, to mention just a few. … Read more

DelegateCall or Storage Collision Attack on Smart Contracts

The post is part 6 and continues our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack The DelegateCall attack or storage collision is expounded in this post. Before you can grasp this exploit, you must first understand how … Read more