-
Continue reading →: Goodbye 3G (A UK Perspective)It’s the early 2000s. Voice calls and text messages (SMS) make up the major reason a phone contract is chosen, with mobile phones being mainly that – a mobile version of a phone. But coming around the corner is a potential game changer in the 3rd generation of mobile networks, 3G. …
-
Continue reading →: TCP/IP ModelIn this blog post the TCP/IP Model is looked at to give an overview of how it operates and how data moves through it. Examples are given of each layer of the TCP/IP Model. TCP/IP Model The TCP/IP model is made up of layers: Application Transport Internet Link Data is…
-
Continue reading →: Networking ProtocolsCommunication requires protocols (rules) so that those involved in the communication understand how to interact. In the world of technology this could be communication between two or more computers which means for example they may need to understand: Protocols for use over the Internet are generally published as RFCs (Request…
-
Continue reading →: Marvel Cosmic Invasion (Review)Loosely based on the Marvel’s Annihilation comic book event from the mid 00’s, Marvel Cosmic Invasion brings the epic annihilation wave to video gaming in 2025. The game is a side scrolling beat’ em up that feels reminiscent of Konami’s X-Men or Data East’s Captain America and The Avengers. Annihilation…
-
Continue reading →: Base64 – Decoding and Padding Problems (Python)On my exploration of JSON Web Tokens (JWT) I’m having some fun creating a basic Flask (Python) webapp that uses JWTs thanks to the ‘Flask JWT Extended‘. I’ve created a page that shows the encoded JWT Header, Payload and Signature, and then shows the decoded JWT Header and Payload. It…
-
Continue reading →: JSON Web Token / JWT (Security)When creating a web application there are different ways to handle authentication (e.g. signing in). My previous web applications used username / password but is it the best way to handle it? The Drawbacks of Username / Password Combo Using a username and password combination helps authenticate users (e.g. someone…
-
Continue reading →: Security: OWASP Top Ten 2025The Open Web Application Security Project (OWASP) provides a top ten list of security risks in web applications, and the 2025 candidate list is now available. I previously wrote about the OWASP Top Ten back in 2022 with reference to the 2021 list, so how does the 2025 OWASP Top…
-
Continue reading →: How good is Artificial Intelligence at writing a blog post? (Artificial Intelligence)This blog post investigates three LLMs to see if Artificial Intelligence (AI) can write in the style of geektechstuff.com
-
Continue reading →: Artificial Intelligence: Vector EmbeddingsA blog post looking at what vector embeddings are, how to generate a vector embedding, and what a vector embedding looks like.
-
Continue reading →: Arcade Club Bury (Review)Tron: Ares is due to hit cinemas this October (2025) in the UK, and thinking of Tron reminds me of classic video game arcades thanks to Flynn’s. In present day arcades are generally found in bowling alleys and can cost quite a bit (£1 a play on average, and £2…
