Skip to content
Header Logo Without Tag
Search
  • Home
  • Articles
    • Code
    • Blog
    • Meta
    • Teach
  • Series
  • Tags
  • About
    • Newsletter
    • Privacy Policy
    • Terms of Service
    • World Domination Checklist
    • Wall of Fame
    • Wall of Shame

Posts by Jeremy Grifski

link to Trust Me! Your Code Isn’t That Bad

Trust Me! Your Code Isn’t That Bad

Today, just about anybody can pick up a language like Python or JavaScript and make something cool. Yet, the culture of the super genius programmer persists and leaves a lot of us in the field...

Continue Reading
link to The Difference Between str() and repr() in Python: A Design by Contract Perspective

The Difference Between str() and repr() in Python: A Design by Contract Perspective

Recently, I was giving a lecture about Java's "common" methods (i.e., all of the methods of Object), and I had epiphany about how Java only has toString() while Python has str() and repr(). So, it...

Continue Reading
link to Obfuscation Techniques: Magic Numbers

Obfuscation Techniques: Magic Numbers

Magic numbers are numerical constants that have no clear meaning in the code and therefore make code harder to read. Anything that makes code harder to read is something we can use to obfuscate our...

Continue Reading
link to Obfuscation Techniques: No More Type Hints

Obfuscation Techniques: No More Type Hints

Type hinting is a nice tool that dynamic typing languages employ to make code more readable. As you can probably imagine, readability is not the goal with obfuscating code, so we ought to get rid of...

Continue Reading
link to Obfuscation Techniques: Visually Similar Characters

Obfuscation Techniques: Visually Similar Characters

One of the more nasty tricks we have in our obfuscation toolbelt is the reality that text has a lot of visually similar characters. If we sprinkle enough of them around, we can have some tough to...

Continue Reading
link to Obfuscation Techniques: Shadowing Built-in Functions

Obfuscation Techniques: Shadowing Built-in Functions

Continuing the series of obfuscation techniques, I thought up a sinister one recently that breaks the best practice of not shadowing built-in functions. I bet you'll have fun with this one!

Continue Reading
« PREV Page 1 … Page 15 Page 16 Page 17 Page 18 Page 19 … Page 109 NEXT »

About the Author

Jeremy grew up in a small town where he enjoyed playing soccer and video games, practicing taekwondo, and trading Pokémon cards. Once out of the nest, he pursued a Bachelors in Computer Engineering with a minor in Game Design. After college, he spent about two years writing software for a major engineering company. Then, he earned a master's in Computer Science and Engineering. Most recently, he earned a PhD in Engineering Education and now works as a Lecturer. In his spare time, Jeremy enjoys spending time with his wife and kid, playing Overwatch 2, Lethal Company, and Baldur's Gate 3, reading manga, watching Penguins hockey, and traveling the world.

Legal

The Renegade Coder is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.






Longest Active Series

  • Journey to a PhD (55)
  • Coding Tangents (45)
  • How to Python (42)
  • Sample Programs Repo News (20)
  • The Autodidact's Guide to Python (11)
  • Discord
  • GitHub
  • Newsletter
  • Patreon
  • Portfolio
  • YouTube
  • Statistics
© 2016-2025 Copyright The Renegade Coder