Dev Matters

Programming, DevOps, Cybersecurity, and the Journey in Tech

The Curious Case of Alice Bob and Friends

The Hidden Code Behind Programming Names

Ever wondered why Alice, Bob, Eve, and Mallory keep showing up in cryptography and programming examples? Discover their origins, roles, and why developers can’t stop using these legendary placeholder names.

Who is Foo Bar and Baz

The Bizarre Tale Behind Programming's Favorite Nonsense Words

Ever wondered why programming examples mostly use foo, bar and baz? These words trace back to military slang (FUBAR) and early computing culture. Used as neutral placeholders, they help programmers focus on logic rather than real-world names. This post explores their origins, evolution, and why they remain an inside joke in coding.

Recap, Further Resources, and Closing Thoughts

SSH Series: Part 9

In this final post, we review key SSH insights—from setup and security hardening to advanced techniques—highlight top resources for continued learning, and propose practical projects so you can confidently take your SSH skills to the next level.

SSH Alternatives and Enhancements

SSH Series: Part 8

In this one-stop guide, I will explore how tools like mosh (for high-latency resilience), Teleport (zero-trust and ephemeral certificates), and WireGuard-powered VPNs offer alternatives or enhancements to traditional SSH, each bringing unique advantages for more secure, flexible, and high-performance remote access.

Automating Tasks With Automation

SSH Series: Part 7

Tired of repetitive server chores? Let SSH automation handle the heavy lifting, so you can focus on real innovation

agent