Dev Matters

Programming, DevOps, Cybersecurity, and the Journey in Tech

Cyber Crime is Booming in Australia

Are You on the Target List?

Cyber crime is exploding across Australia, affecting everyday individuals — not just large companies or tech newbies. In this post, I break down why no one is immune, the real scale of cyber threats in our country, and the common scams that are catching smart people off guard. If you’ve ever thought “it won’t happen to me,” this is your wake-up call.

Cyber Crime:The Digital Threats Lurking in Everyone's Life

The Cyber Crime Awareness Series – What You Don’t Know Can Hurt You

Cyber crime isn’t just a technical issue — it’s a human one. This series is your practical guide to understanding how modern scams work, who’s behind them, and how you can protect yourself in today’s digital Australia. Start here and follow each post to become cyber smart, not cyber scared.

The Curious Case of Alice Bob and Friends

The Hidden Code Behind Programming Names

Ever wondered why Alice, Bob, Eve, and Mallory keep showing up in cryptography and programming examples? Discover their origins, roles, and why developers can’t stop using these legendary placeholder names.

Who is Foo Bar and Baz

The Bizarre Tale Behind Programming's Favorite Nonsense Words

Ever wondered why programming examples mostly use foo, bar and baz? These words trace back to military slang (FUBAR) and early computing culture. Used as neutral placeholders, they help programmers focus on logic rather than real-world names. This post explores their origins, evolution, and why they remain an inside joke in coding.

Recap, Further Resources, and Closing Thoughts

SSH Series: Part 9

In this final post, we review key SSH insights—from setup and security hardening to advanced techniques—highlight top resources for continued learning, and propose practical projects so you can confidently take your SSH skills to the next level.