}

Tutorials Index Page 3

beginner

How Teachers Can Detect AI-Written Student Work in 2026 — Practical Guide

Why AI detectors fail, 5 reliable signals of AI writing, pedagogical redesigns that work, and how to talk to students you suspect. A practical 2026 guide.

beginner

Docker Compose Getting Started Guide (2026): Complete Tutorial

Docker Compose v2 getting started guide 2026. Install Compose, compose.yml structure, multi-container app with Postgres and Redis, environment variables, depends_on, and essential commands.

intermediate

Docker Container Networking Explained (2026): Bridge, Host, Overlay

Docker container networking guide 2026. Bridge, host, none, overlay, macvlan explained with inspect commands, container-to-container communication, and expose vs publish ports.

intermediate

How to Reduce Docker Image Size: Multi-Stage Builds and Best Practices (2026)

Reduce Docker image size in 2026 with multi-stage builds, Alpine base images, .dockerignore, layer caching, RUN chaining, and the dive tool. Before/after examples included.

beginner

Go: Convert Rune to String and String to Rune — Complete Guide (2026)

Convert rune to string in Go with string(r). Convert string to rune slice with []rune(s). Covers Unicode, utf8 package, for range iteration, and rune vs byte.

beginner

Go: Convert String to Int (and Int to String) — Complete Guide (2026)

Convert string to int in Go using strconv.Atoi, strconv.ParseInt, fmt.Sscanf. Convert int to string with strconv.Itoa, FormatInt, Sprintf. All methods compared.

beginner

go mod tidy Explained: Clean Up Go Module Dependencies (2026)

go mod tidy adds missing and removes unused dependencies from go.mod and go.sum. Learn go mod download, verify, vendor, -e flag, and common post-tidy errors.

intermediate

Hashcat Rule-Based Attacks: Crack Complex Passwords (2026 Guide)

Complete guide to Hashcat rule-based attacks. Learn built-in rules (best64, rockyou-30000), write custom rules, and use OneRuleToRuleThemAll. Updated March 2026.

beginner

Hashcat vs Hydra: Which Password Tool Should You Use? (2026)

Hashcat vs Hydra compared: offline vs online cracking, speed, use cases, and when to use each. Includes Hydra syntax for SSH, FTP, HTTP and Hashcat examples. Updated 2026.

beginner

Hashcat Wordlist Attack Tutorial: Crack Passwords with rockyou.txt (2026)

Step-by-step Hashcat wordlist attack tutorial using rockyou.txt. Covers MD5, NTLM, and WPA2 hash cracking with exact commands and real output examples. Updated March 2026.