<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Tech on Dev Matters</title><link>https://www.munish-mehta.com/categories/tech/</link><description>Recent content in Tech on Dev Matters</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 21 Nov 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://www.munish-mehta.com/categories/tech/index.xml" rel="self" type="application/rss+xml"/><item><title>Google Gemini 3 Pro - Redefining the Agentic Frontier and Enterprise Intelligence</title><link>https://www.munish-mehta.com/post/google-gemini-pro-3/</link><pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/google-gemini-pro-3/</guid><description>A deep dive into Google Gemini 3 Pro—its architecture, benchmark performance, enterprise use cases, and strategic implications for agentic AI.</description></item><item><title>The Art and Impact of Article Writing Structure Strategy and Substance</title><link>https://www.munish-mehta.com/post/the-art-and-impact-of-article-writing-structure-strategy-and-substance/</link><pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/the-art-and-impact-of-article-writing-structure-strategy-and-substance/</guid><description>This article explores the art and impact of article writing, including structure, strategy, and substance.</description></item><item><title>Get Custom Answers From ChatGPT</title><link>https://www.munish-mehta.com/post/get-custom-answers-from-chatgpt/</link><pubDate>Wed, 19 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/get-custom-answers-from-chatgpt/</guid><description>This guide shows you the four built-in ways to tailor ChatGPT to your context: Memories, Projects, Custom Instructions, and GPTs. It tells you what each one does, when to use which, and how to set them up quickly.</description></item><item><title>Cyber Security Toolkit</title><link>https://www.munish-mehta.com/post/cyber-security/cyber-security-toolkit/</link><pubDate>Tue, 10 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/cyber-security-toolkit/</guid><description>Cyber security starts at home. From app safety to breach monitoring, this toolkit equips you with the everyday habits that keep you and your family secure in a connected world.</description></item><item><title>Digital Detectives</title><link>https://www.munish-mehta.com/post/cyber-security/digital-detectives/</link><pubDate>Tue, 10 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/digital-detectives/</guid><description>Case studies are not just headlines — they’re digital crime stories solved through clever forensics, logs, and sometimes just a typo. Learn how everyday mistakes led to the capture of modern cyber criminals.</description></item><item><title>Inside the Dark Web</title><link>https://www.munish-mehta.com/post/cyber-security/dark-web/</link><pubDate>Sat, 07 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/dark-web/</guid><description>Most people never touch it — but the Dark Web plays a hidden role in fraud, scams, and leaked data. This post lifts the veil on what really happens there, how it affects everyday people, and why awareness is your best defence.</description></item><item><title>The Price of Free</title><link>https://www.munish-mehta.com/post/cyber-security/the-price-of-free/</link><pubDate>Fri, 06 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/the-price-of-free/</guid><description>Free apps aren&amp;rsquo;t really free — they harvest your data and leave you exposed. This post uncovers how everyday Australians are being profiled, leaked, and sold across the web, and how to take back control of your digital life.</description></item><item><title>Your OTP Isn’t Safe</title><link>https://www.munish-mehta.com/post/cyber-security/otp-scams/</link><pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/otp-scams/</guid><description>Think OTPs keep you safe? Think again. This post reveals 12 real-world ways scammers steal or bypass One-Time Passwords in Australia — from SIM swaps and spoofed messages to malware and call forwarding tricks — plus what you can do to truly protect your identity and accounts.</description></item><item><title>Digital Arrests, Loan App Blackmail &amp; High-Stakes Scams Targeting Australians</title><link>https://www.munish-mehta.com/post/cyber-security/digital-arrest-scam/</link><pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/digital-arrest-scam/</guid><description>Digital arrest and loan app scams are rising in Australia. Learn how these psychological traps work — and how to protect yourself from high-stakes fraud.</description></item><item><title>Don’t Click That Link!</title><link>https://www.munish-mehta.com/post/cyber-security/online-scams/</link><pubDate>Tue, 03 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/online-scams/</guid><description>From QR code traps to phishing links and fake Telstra calls, discover how social engineering scams manipulate trust — and how to stay two steps ahead.</description></item><item><title>Cyber Crime is Booming in Australia</title><link>https://www.munish-mehta.com/post/cyber-security/cyber-crime-australia/</link><pubDate>Mon, 02 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/cyber-crime-australia/</guid><description>Cyber crime is exploding across Australia, affecting everyday individuals — not just large companies or tech newbies. In this post, I break down why no one is immune, the real scale of cyber threats in our country, and the common scams that are catching smart people off guard. If you’ve ever thought &amp;ldquo;it won’t happen to me,&amp;rdquo; this is your wake-up call.</description></item><item><title>Cyber Crime:The Digital Threats Lurking in Everyone's Life</title><link>https://www.munish-mehta.com/post/cyber-security/cyber-security-intro/</link><pubDate>Sun, 01 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/cyber-security-intro/</guid><description>Cyber crime isn’t just a technical issue — it’s a human one. This series is your practical guide to understanding how modern scams work, who’s behind them, and how you can protect yourself in today’s digital Australia. Start here and follow each post to become cyber smart, not cyber scared.</description></item><item><title>Recap, Further Resources, and Closing Thoughts</title><link>https://www.munish-mehta.com/post/recap-further-resources-and-closing-thoughts/</link><pubDate>Wed, 29 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/recap-further-resources-and-closing-thoughts/</guid><description>In this final post, we review key SSH insights—from setup and security hardening to advanced techniques—highlight top resources for continued learning, and propose practical projects so you can confidently take your SSH skills to the next level.</description></item><item><title>SSH Alternatives and Enhancements</title><link>https://www.munish-mehta.com/post/ssh-alternatives-and-enhancements/</link><pubDate>Tue, 28 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/ssh-alternatives-and-enhancements/</guid><description>In this one-stop guide, I will explore how tools like mosh (for high-latency resilience), Teleport (zero-trust and ephemeral certificates), and WireGuard-powered VPNs offer alternatives or enhancements to traditional SSH, each bringing unique advantages for more secure, flexible, and high-performance remote access.</description></item><item><title>Automating Tasks With Automation</title><link>https://www.munish-mehta.com/post/automating-tasks-with-automation/</link><pubDate>Mon, 27 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/automating-tasks-with-automation/</guid><description>Tired of repetitive server chores? Let SSH automation handle the heavy lifting, so you can focus on real innovation</description></item><item><title>Troubleshooting Common SSH Issues</title><link>https://www.munish-mehta.com/post/troubleshooting-common-ssh-issues/</link><pubDate>Sun, 26 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/troubleshooting-common-ssh-issues/</guid><description>From verbose logs to file permissions, a bit of know-how goes a long way in keeping your SSH sessions smooth and secure</description></item><item><title>Advanced SSH Techniques</title><link>https://www.munish-mehta.com/post/advanced-ssh-techniques/</link><pubDate>Sat, 25 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/advanced-ssh-techniques/</guid><description>Elevate Your Remote Access: Master Advanced SSH Techniques for a Smoother, More Secure Workflow!</description></item><item><title>SSH Best Practices and Security Hardening</title><link>https://www.munish-mehta.com/post/ssh-best-practices-and-security-hardening/</link><pubDate>Fri, 24 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/ssh-best-practices-and-security-hardening/</guid><description>Fortify Your Remote Access: Hardening SSH for Unyielding Security</description></item><item><title>SSH Key Based Authentication</title><link>https://www.munish-mehta.com/post/ssh-key-based-authentication/</link><pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/ssh-key-based-authentication/</guid><description>Secure Shell is all about convenience and security. Once you get comfortable with these essentials, you’ll be well on your way to harnessing the full power of SSH!</description></item><item><title>Setting Up and Using SSH</title><link>https://www.munish-mehta.com/post/setting-ssh/</link><pubDate>Wed, 22 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/setting-ssh/</guid><description>In this article i would be show you how to set up and use SSH to make our first secure connection.</description></item><item><title>Introduction to SSH</title><link>https://www.munish-mehta.com/post/introduction-to-ssh/</link><pubDate>Tue, 21 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/introduction-to-ssh/</guid><description>In this article i would be discussing what were the shortcomings of earlier protocols such as SSH and why SSH was discovered</description></item><item><title>How Machines Securely Communicate with Each Other</title><link>https://www.munish-mehta.com/post/how-machines-securely-chat-each-other/</link><pubDate>Mon, 20 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/how-machines-securely-chat-each-other/</guid><description>Have you ever wondered how computers securely talk to each other across the internet, without prying eyes snooping on their conversation? Welcome to the first part of my brand-new blog series, where I would try to demystify &lt;strong>SSH&lt;/strong>—the silent hero of remote server management and secure communication.</description></item><item><title>How I Started My Blogging Site With Hugo</title><link>https://www.munish-mehta.com/post/how-i-started-my-blogging-site-with-hugo/</link><pubDate>Sat, 11 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/how-i-started-my-blogging-site-with-hugo/</guid><description>In this article i would be explaining how i started my blogging site with hugo</description></item></channel></rss>