Language Selection

English French German Italian Portuguese Spanish

Python Programming

Filed under
Development
  • Multiple File/Image Upload with Django 3, Angular 10 and FormData

    In the previous tutorial we have seen how to implement file uploading in Django and Angular 10. In this tutorial, we'll see how to implement multiple file uploading with FormData.

    It's recommended that you start from the previous tutorial to see detailed steps of how to create a django project, how to install Angular CLI and generate a new Angular 10 project along with services and components as we won't cover those basics in this part.

  • Python Projects for Beginners (Massive 2020 Update)

    Learning Python can be difficult. You can spend time reading a textbook or watching videos, but then struggle to actually put what you've learned into practice. Or you might spend a ton of time learning syntax and get bored or lose motivation.

    How can you increase your chances of success? By building Python projects. That way you're learning by actually doing what you want to do!

    When I was learning Python, building projects helped me bring together everything I was learning. Once I started building projects, I immediately felt like I was making more progress.

    Project-based learning is also the philosophy behind our teaching method at Dataquest, where we teach data science skills using Python. Why? Because time and time again, we’ve seen that it works!

  • Practical Recipes for Working With Files in Python

    Python has several built-in modules and functions for handling files. These functions are spread out over several modules such as os, os.path, shutil, and pathlib, to name a few. This course gathers in one place many of the functions you need to know in order to perform the most common operations on files in Python.

  • Introduction to scheduled tasks helper scripts

    For all PythonAnywhere users who like to automate their workflow using scripts there’s already the pythonanywhere package which provides an interface for some PythonAnywhere API features. If you’re one of them, you might be interested in some recent additions for programmatic management of Scheduled Tasks.

  • Mike Driscoll: Python Malware May be Coming to a Computer Near You

    Cyborg Security reported recently that malware is starting to appear that has been written using the Python programming language. Traditionally, most malware has been written in compiled languages, such as C or C++.

    The reason is simple. Compiled languages let the attacker create smaller, harder to detect, executables. However, Python’s popularity and ease of use has made it more appealing to malware authors. The biggest problem with Python for malware is that it tends to use considerably more RAM and CPU than malware written in C or C++.

    Of course, with PCs being as powerful as they are now, this is no longer an issue. Especially when you consider that there are so many applications being written with Electron. Your web browser is now a huge resource hog!

    As the Cyborg Security website points out, you can use PyInstaller or py2exe to create an executable of your Python code. What that article doesn’t mention is that someone will need to digitally sign that software as well to get it to run on Windows 10. One thing the article mentions that was interesting to me is that you can use Nuitka to basically transpile your Python code to C and you’ll end up with a much smaller executable than you would with either PyInstaller or py2exe.

  • PyCoder’s Weekly: Issue #432 (Aug. 4, 2020)
  • PSF GSoC students blogs: Weekly Check-in #10
  • Python 3.6.9 : My colab tutorials - parts 008.

More in Tux Machines

TechNexion Unveils EDM and AXON SoM’s Powered by NXP i.MX8M Plus SoC

The company offers standard support for Ubuntu 20.04 LTS, Linux-built Yocto Project, and Android 10, as well as extended support for FreeRTOS. If it feels like you’ve seen EDM-G-IMX8M-PLUS module before it’s because it should be the one found in the upcoming Wandboard 8MPLUS SBC. There’s will be other development kits based on existing AXON/EDM baseboards including AXON-PI Raspberry Pi-like starter board, or the full-featured AXON-WIZARD and EDM-WIZARD evaluation boards. Marcel vandenHeuvel, TechNexion’s CEO, gives an overview of the AXON i.MX8M Plus modules and baseboard, and shows a Yocto 3.0 Linux demo with dual displays. Read more

Security: AppArmor and SELinux, Linux Security Features and Zero Trust Security Model

  • Technologies for container isolation: A comparison of AppArmor and SELinux

    I researched how containers, virtual machines (VMs), and processes, in general, are separated by different technologies—namely, AppArmor and SELinux. My goal was to compare these solutions for isolation/separation capabilities in the cloud world. Just as a reminder, Red Hat Enterprise Linux uses SELinux technology to separate processes, containers, and VMs. OpenShift also uses this technology. The first option is an isolation technology called AppArmor, which is a very similar technology to SELinux. However, it is not label-based. AppArmor security profiles, which are equivalent to SELinux security policies, look more user-friendly, but that’s because AppArmor is less complicated and controls fewer operations.

  • Kees Cook: security things in Linux v5.7

    Linux v5.7 was released at the end of May. [...] After Silvio Cesare observed some weaknesses in the implementation of CONFIG_SLAB_FREELIST_HARDENED‘s freelist pointer content obfuscation, I improved their bit diffusion, which makes attacks require significantly more memory content exposures to defeat the obfuscation. As part of the conversation, Vitaly Nikolenko pointed out that the freelist pointer’s location made it relatively easy to target too (for either disclosures or overwrites), so I moved it away from the edge of the slab, making it harder to reach through small-sized overflows (which usually target the freelist pointer). As it turns out, there were a few assumptions in the kernel about the location of the freelist pointer, which had to also get cleaned up.

  • Zero Trust Security Model

    The Zero Trust Network, also called Zero Trust Architecture, is a model that was developed in 2010 by the principal analyst John Kindervag. A zero-trust security system helps to protect the enterprise system and improves cybersecurity. [...] The Zero Trust approach depends upon modern technologies and methods to achieve the target of securing an organization. The Zero Trust Model calls for businesses to manipulate micro-segmentation and granular perimeter execution based on users, their whereabouts, and other data or information, to find out whether to believe a user, machine, or application that is trying to seek access to a specific part of the enterprise or organization. Zero Trust also takes care of all other policies, for example, giving users the least access they require to complete the task they want to complete. Creating a Zero Trust environment is not only about putting into practice the separate singular technology associations; it is also about using these and other technologies to impose the idea that no one and nothing should have access until they have proven that they should be trusted. Of course, organizations know that creating a Zero Trust Security Model is not an overnight achievement. Because it is not easy to achieve something so complex in a single night, it can take years to find the most secure, ideal system possible. Many companies are shifting to the cloud security system. These systems have the best options to go to Zero Trust. Now is the time to be ready for a Zero Trust transition. All organizations, either large or small, or should have Zero Trust security systems for their data safety.

Linux Lite 5.2 RC-1 Is Now Available For Download And Testing

Linux Lite is undoubtedly one of the best lightweight and Windows alternative Linux operating systems. Earlier on May 31, 2020, Linux Lite creator Jerry Bezencon released the most feature-rich, Linux Lite 5.0 “Emerald.” Working on the next Linux Lite 5.2 version release, Jerry Bezencon has now made its first testing version available for download. So, let’s see what the new features and updates are coming in the Linux Lite 5.2. Read more

Android Leftovers