Teslim Sadiq

909 posts

Teslim Sadiq banner
Teslim Sadiq

Teslim Sadiq

@teslimcodes

Software Engineer || 9x Hackathon Winner || Founder @GPAihq || Mechanical Engineering @UnilagNigeria ||

anywhere belle face Katılım Ekim 2024
1K Takip Edilen1.3K Takipçiler
Sabitlenmiş Tweet
Teslim Sadiq
Teslim Sadiq@teslimcodes·
Bagged Hackathon W number 5 today! So happy fr! Thanks to my teammates, Africa Creative Market, @awscloud @_ascendstudios @Cc_HUB. Cheers to more and the beginning of FairPlay Africa.
Teslim Sadiq tweet mediaTeslim Sadiq tweet media
English
190
144
2.7K
86.1K
Teslim Sadiq
Teslim Sadiq@teslimcodes·
@frontend__fairy @rik22ky It does tbh. Doing things like giving it a reference to a very good site you want to replicate or having your own imagination of how it should look will make it different and unique, unlike you just telling it “build this website”
English
0
0
0
5
Mide | Frontend Developer
Mide | Frontend Developer@frontend__fairy·
Is it just me, or do all AI-generated websites kind of look the same?
English
36
10
77
2.1K
Teslim Sadiq
Teslim Sadiq@teslimcodes·
Never in my life did I think I’d get B in a Software Engineering course in school.
English
12
1
81
6.1K
Sam Ivere
Sam Ivere@hsprafrique·
Whǎkeè failed the technical interview at her dream company three times. First time: system design. Second time: algorithms. Third time: she passed everything and failed the culture fit interview with a hiring manager who said she seemed "too direct." Whǎkeè went home and sat with that for a long time. Then she wrote a blog post titled: "What 'too direct' means when it's said to a woman in a technical interview." 80,000 reads. 4,000 shares. 3 job offers from companies who said they found her through the post and specifically wanted someone who wrote exactly like that and thought exactly like that and would never stop being that direct. She took the best offer. Salary: 3x what her dream company had been advertising. "Too direct" turned out to be exactly right for the right room. Find your room. Not the room that needs you to be smaller to fit inside it.✨
English
6
8
40
1.3K
Nunsi Shiaki
Nunsi Shiaki@NShiaki·
In my element....gosshh😇🤭
Nunsi Shiaki tweet media
English
16
5
179
3.1K
Whakee🎀
Whakee🎀@whakee_·
God!!!!!!!!!!!!!😭😭😭😭😭😭
ኔፋሪ (ProgFi arc)@Nefarii

Track 1 Winners Announcement of the Sui Creator Program First off, huge thank you to everyone who participated in Track 1. The quality of submissions across the board was genuinely impressive and it was great seeing creators experiment with different storytelling formats across DeepBook, Hashi, and broader Sui Defi narratives. We saw everything from creative skits, educational breakdowns, polished explainers, AI-assisted content, and even documentary-style storytelling. Everyone brought strong effort, and narrowing this down was not easy. Submissions were reviewed based on: Hook strength Narrative clarity Originality Production quality Ecosystem value Topic diversity Accuracy/technical understanding Without further ado, The winners are: 1st Place @Whakee $1,500 Topic: DeepBook Most creative submission in the cohort Unique courtroom-style storytelling format Strong hook and highly memorable delivery 2nd Place @anurag__kochar $1,000 Topic: DeepBook Strong institutional-style storytelling Excellent macro framing around DeFi infrastructure issues High ecosystem repost potential 3rd Place @sheisTobi_ $500 Topic: Hashi Strong educational breakdown Clear explanation flow Helped diversify winning narratives beyond DeepBook Honorable Mentions @thegck Strong production quality and polished editing. @ZibahTheCreator Strong educational breakdown on Hashi. @jobiak1_ Solid execution with strong fundamentals. @0xTinaa06 Creative use of animated clips to explain DeepBook in a fun way. Special HM: @Silverhard High-effort documentary-style submission with strong research depth. While impressive, it felt better suited for broader ecosystem milestone storytelling and was submitted after the deadline. Again, thank you to everyone who participated, there were genuinely strong entries across the board and we’re excited about the creator talent emerging from this program. Track 2 details will be shared soon. Stay tuned 👀

120
15
232
7K
PAM PAM💙🌹
PAM PAM💙🌹@pamilhereen·
DAY 9 OF MY BACKEND JOURNEY Today, I mastered Password Hashing and Security with bcryptjs. The foundation of protecting user credentials and preventing catastrophic breaches through industry-standard cryptographic practices. Learning with @Nannoyapp ● I learned why plain-text passwords and fast-hash algorithms like MD5 and SHA-1 are dangerous, and why bcryptjs with adaptive hashing is the industry standard for password protection. ● I discovered that bcryptjs uses configurable salt rounds, making it future-proof as hardware improves, the cost factor can be increased to maintain security without changing the algorithm. ● I understood the registration flow: hash incoming passwords with bcrypt.hash() using at least 10 salt rounds before storing them in the database, ensuring attackers see hashes, not passwords, if breached. ● I learned that login verification uses bcrypt.compare(), which is timing-safe to prevent side-channel attacks where response time could leak information about password matching. ● I discovered that returning generic "Invalid credentials" messages for both missing usernames and wrong passwords prevents username enumeration attacks and keeps attackers guessing. ● I understood that salt rounds directly impact security and performance 10 rounds takes ~65ms and is production minimum, while 12 rounds (~250ms) is recommended for 2026, requiring benchmarking on actual hardware. ● I troubleshot a MongoDB connection issue caused by network restrictions and learned that a VPN can help bypass DNS resolution problems when connecting to cloud databases. ● I now know that password hashing and proper error handling are non-negotiable. They make authentication secure, predictable, and protect user data from compromise.
PAM PAM💙🌹 tweet mediaPAM PAM💙🌹 tweet mediaPAM PAM💙🌹 tweet mediaPAM PAM💙🌹 tweet media
PAM PAM💙🌹@pamilhereen

DAY 8 OF MY BACKEND JOURNEY Password Hashing and Security with bcryptjs Today, I deepened my understanding of one of the most critical aspects of backend development: protecting user passwords. I learned that plain-text passwords are inexcusable, and even fast hashing algorithms like MD5 or SHA-1 leave systems vulnerable to brute-force and rainbow-table attacks. Learning with @Nannoyapp ● I discovered why adaptive hashing algorithms like bcryptjs are the industry standard. Unlike fast hashes, bcryptjs has a configurable cost factor (salt rounds) that can be increased as hardware improves, making it future-proof against computational advances. ● I learned the registration flow: hash the incoming password with bcrypt.hash() using at least 10 salt rounds before storing it in the database, ensuring that even if breached, attackers see hashes, not passwords. ● I understood the login verification process: use bcrypt.compare() to check if the plain-text password matches the stored hash. This function is timing-safe, preventing side-channel attacks where response time could leak information about where strings differ. ● I implemented proper error handling by returning a generic "Invalid credentials" message for both missing usernames and wrong passwords, refusing to reveal which one failed, a security best practice that prevents username enumeration attacks. ● I learned that salt rounds matter: 10 rounds takes ~65ms and is the production minimum, while 12 rounds (~250ms) is recommended for 2026. Benchmarking on production hardware is essential to balance security and user experience. OMO! I faced infrastructure challenges today🤦‍♀️: power supply issues disrupted my session. I installed Postman to test my endpoints oo, but it wasn't responding. So I switched to curl commands in the terminal to verify my hashing and login flows, but my PC went off right when I was about to run the tests. Frustrating timing, but the knowledge stuck with me. The journey continues, sometimes the hardest part isn't the code, it's fighting the hardware! 😭 Good evening everyone!

English
4
4
39
1.5K