ABOUT ME

I'm @Devmecha a web app developer and a blogger. This my offical blog. My job is to provide you with assistance or a custom web project using LARAVEL , Angular and more Tools. Feel free to contact me!.

MY SKILLS

Here are my top skills.

Graphics and Design

Photoshop
InDesign
AfterEffect

Websites

LARAVEL
ANGULAR
JAVASCRIPT
VUE.JS
PYTHON
BOOTSTRAP & BULMA

OTHERS

TRANSLATION ENGLISH & FRENCH
ARTICLES/ POSTS ENGLISH & FRENCH
CMMS (Engineering)

ACHIEVEMENTS

Everyday is a new challenge,learn, analyze then create, and the client feedback make me improve.

PROJECTS

Weekly Hours Work Time

+30

New Ideas

Average weekly lines of code

STRATEGY & CREATIVITY


PORTFOLIO

I'm happy to share with you my projects, tutorials and tips so you can learn more.

  • Example App using Ionic 3 with Angular 5

    Example App using Ionic 3 with Angular 5




    Description : 
    This is a example App showing the basics of using Ionic 3 with Angular 5.


    Result :


  • PYTHON : HACKING THE SUBSTITUTION CIPHER

    PYTHON : HACKING THE SUBSTITUTION CIPHER

    In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
    .
  • PYTHON : THE SUBSTITUTION CIPHER - ENCRYPTING & DECRYPTING

    PYTHON : THE SUBSTITUTION CIPHER - ENCRYPTING & DECRYPTING

    In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
    .
  • Coming Soon Landing Page

    Coming Soon Landing Page


    My GitHub link is here : https://github.com/devmecha/CS_Landing_Page
  • PYTHON : KEYLOGGER 1.0

    PYTHON : KEYLOGGER 1.0


        My GitHub code : https://github.com/devmecha/KeyLogger_1.0_Python
    Using a KeyLogger is an act of tracking and recording every keystroke entry made on a computer, often without the permission or knowledge of the user.
  • PYTHON : HACKING THE AFFINE CIPHER

    PYTHON : HACKING THE AFFINE CIPHER


        My GitHub code : https://github.com/devmecha/HACKING_AFFINE_CIPHER
    The affine cipher is a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is essentially a standard substitution cipher with a rule governing which letter goes to which. As such, it has the weaknesses of all substitution ciphers. Each letter is enciphered with the function F(x) = (ax + b) mod m
    where modulus m is the size of the alphabet and a and b are the key of the cipher.
  • THE AFFINE CIPHER - ENCRYPTING & DECRYPTING

    THE AFFINE CIPHER - ENCRYPTING & DECRYPTING


        My GitHub code : https://github.com/devmecha/THE_AFFINE_CIPHER
    The affine cipher is a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is essentially a standard substitution cipher with a rule governing which letter goes to which. As such, it has the weaknesses of all substitution ciphers. Each letter is enciphered with the function F(x) = (ax + b) mod m
    where modulus m is the size of the alphabet and a and b are the key of the cipher.
  • PYTHON : HACKING THE TRANSPOSITION CIPHER

    PYTHON : HACKING THE TRANSPOSITION CIPHER


        My GitHub code : https://github.com/devmecha/HACKING_TRANSP_CIPHER
    In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.
  • WHAT I DO

    I've been creating and developing for clients for more than 3 years.

    CONTACT US

    You can contact me in several different ways. Contact details are below.

    DevMecha

    • City :MARRAKESH
    • Country :MOROCCO
    • Email :mechadev.contact@gmail.com

    Looking for a new web site, design or developement, talk to us so we can help you!.