freeCodeCamp

How Attackers Steal Data from Websites (And How to Stop Them)

Alex Tray |
Across platforms, behind every app, and on your own website, hackers may patiently wait. These days, everyone should have identity theft protections, and be informed about data threats lurking in the trenches of the world-wide-web’s war on privacy a...... read more

How to Get Information About Your Linux System Through the Command Line

Zaira Hira |
Whether you’ve just gained access to a new Linux system, ethically hacked into one as part of a security test, or you’re just curious to know more about your current machine, this article will guide you through the process. You’ll learn how you can g...... read more

The Apple Code Signing Handbook

Sravan Karuturi |
In this handbook, I’ll demystify the Apple app code signing process. Apple's ecosystem is powerful, but its distribution mechanisms – with various identifiers, certificates, and profiles – can appear complex. This guide attempts to make that journey ...... read more

How To Deploy a Next.js App To Vercel With GitHub Actions

Chidiadi Anyanwu |
Vercel is a cloud platform or Platform-as-a-Service (PaaS) designed to help frontend developers create, preview, and deploy web applications swiftly and efficiently. In this tutorial, we’ll focus on deploying a Next.js application to Vercel using Git...... read more

Learn the MERN Stack in 2025

Beau Carnes |
If you’ve been meaning to learn full-stack web development but don’t know where to start, this new course is a solid way in. Whether you're aiming to get a job in web dev or just want to build your own projects, understanding how the pieces fit toget...... read more

From electrical engineering student to CTO with Hitesh Choudhary [Podcast #175]

Beau Carnes |
On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews former CTO and prolific programming teacher Hitesh Choudhary. We talk about: The limits of AI in building a robust codebase Time management Higher Education in ...... read more

How to Protect Your Remote Workforce from Cyber Attacks

Manish Shivanandhan |
Working remotely gives your team flexibility, but it also opens the door to cyber threats. Remote workers are more exposed without the protection of office firewalls and on-site IT teams. Hackers know that people often use weak passwords, forget to ...... read more

How to Reduce Technical Debt in the Power Platform

Brandon Wozniewicz |
Technical debt refers to the future cost – measured in terms of time, money, effort, or opportunity – of choosing expedient solutions today instead of more deliberate and scalable ones. And it's not just a pro-code concept. It might be easier to unde...... read more

The Micro-Frontend Architecture Handbook

Andrew Maksimchenko |
Over the years, in my role as a lead full-stack developer, solutions architect, and mentor, I’ve been immersed in the world of micro frontend architecture, working across different large-scale frontend projects where multiple teams, stacks, and deplo...... read more

OpenFeign vs WebClient: How to Choose a REST Client for Your Spring Boot Project

Mario Casari |
When building microservices with Spring Boot, you’ll have to decide how the services will communicate with one another. The basic choices in terms of protocols are Messaging and REST. In this article we’ll discuss tools based on REST, which is a comm...... read more