One of the more nasty tricks we have in our obfuscation toolbelt is the reality that text has a lot of visually similar characters. If we sprinkle enough of them around, we can have some tough to...
Welcome to The Renegade Coder, a site for people interested in Python programming and college teaching! Join me on Patreon for even more content.
Latest Articles
Continuing the series of obfuscation techniques, I thought up a sinister one recently that breaks the best practice of not shadowing built-in functions. I bet you'll have fun with this one!
While considering the various obfuscation techniques, I was thinking about the role comments play in readability. After all, we've all heard that writing comments is a best practice, yet it's very...
As a community, we spend a lot of time debating best practices. Perhaps it's time we establish actual bad practices. Or as I like to put them, obfuscation techniques. To kick off this new series, I...
Students Should Be Able to Build a Portfolio From Their Coursework
Computer science is a more creative field than academia gives it credit. In honor of that creativity, we really ought to be giving students more chances to create original work and build portfolios...
Why I’m No Longer Giving Paper Exams in My Computer Science Courses
I'm embracing the virtual world and moving all of my computer science exams online. Here's why!