Tools Blog Learn Quizzes Smile API Log In / Sign Up
Tools Blog Learn Quizzes Smile API Log In / Sign Up
We have updated our privacy policy to let you know that we use cookies to personalise content and ads. We also use cookies to analyse our traffic and we share information about your use of our site and application with our advertising and analytics partners. By using this website or our application you agree to our use of cookies. Learn more about the way this website uses cookies or remove this message.

My name is Daniel. I am a full-stack web developer.

I started coding in 2005 and since then I have worked on tens of projects out of which I've open sourced a few.

Right now, I am a partner and CTO at Web3Box Software, a web development company based in Henderson, Nevada. Even if I am very busy with my main activity, from time to time I like to take on challenging freelance projects, mainly through Toptal.

CodePunker.com exists because I strongly believe that web development is the coolest career a person can ever pursue. As a consequence I try to guide people who are just starting out and also help those who are already part of the industry.

On Codepunker.com you'll find some tutorials on various topics related to web development. I have also coded some fun apps and a learning section to spark the interest of the newcomer.

Finally, for those of you who are already web developers, I've written a few web apps and an API which are meant to reduce the time you spend for specific daily tasks.

Want to get in touch ? Shoot me an email at info [at] codepunker.com.

Cheers!


Daniel Gheorghe
info[at]codepunker.com
Web3Box Software LLC


Alerts

2017-07-25 - Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch. Read more ...
2017-07-25 - Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data. Read more ...

See All Entries...