ICWIB

I Create When I'm Bored.

ICWIB Admin

  • Petal Push v2.0 | Project Documentation 🌿

    This documentation provides an overview of the architecture, features, and technical implementation of Petal Push, a gamified habit tracker developed for Android. ### Technical Overview ### Core Features ### Data Persistence Logic The app utilizes a custom StoreAppData class to manage preferences. Habits are stored as a CSV (comma-separated values) string and parsed back into… Read more


    by

    in

  • Privacy Policy for Petal Push

    This Privacy Policy describes how Petal Push (“we,” “our,” or “the App”) handles your information. 1. Information Collection and Use Petal Push is a habit-tracking app designed for personal use. We do not collect, store, or share any personal information, habit data, or “Plant Power” progress on external servers. All data is stored locally on… Read more


    by

    in

  • IPsec

    Internet Protocol Security (IPsec) is a suite of protocols that provides secure communication over an Internet Protocol (IP) network. Its primary purpose is to ensure the confidentiality, integrity, and authenticity of data packets exchanged between two entities (e.g., two computers, a computer and a network, or two networks). Here’s a breakdown of key aspects of… Read more


    by

    in

  • JavaScript Essentials: A Quick Reference Guide

    This guide summarizes key concepts and essential tools for anyone learning or working with JavaScript. It’s designed to be a quick reference for future use. 1. Introduction & Setup 2. Getting Started with JavaScript 3. Core Concepts: Objects, Strings, and the DOM Objects JavaScript is heavily object-oriented. An Object is a fundamental data type used… Read more


    by

    in

  • Understanding Cybersecurity: Attacks and Defenses

    Cybersecurity involves understanding and defending against a diverse range of cyber-attacks and implementing robust defense mechanisms. Attacks can range from Man-in-the-Middle attacks, where communication is intercepted, to phishing, which deceives individuals into revealing sensitive information. Other prevalent threats include drive-by attacks (malware downloads from compromised websites), botnet attacks (networks of compromised computers), and social engineering… Read more


    by

    in

  • Is a Coding Bootcamp Worth It?

    Alright, so for those who don’t know, I actually went through a coding bootcamp. Yeah, it was pretty full-on and crammed a whole lot of learning into a really short amount of time. I’m putting this out there because I wanted to share my thoughts on it, you know, leave a bit of a review… Read more


    by

    in

  • About The Creator

    About Me Hi there! I’m A—though some of my closest friends and family call me D, R, or even DR (a mashup of both!). I’m a developer, student, dreamer, and cat parent to my two furry companions, M and T, who keep me company during late-night coding sessions and study marathons. By day (and sometimes night), I juggle two jobs while pursuing my studies—proof that… Read more


    by

    in