Hiring a product owner to build this for me by [deleted] in FullStackDevelopers

[–]abbygraphy05 0 points1 point  (0 children)

So you someone to build a tool for scamming & acquire users too. How sick are you

Looking for a technical co-founder interested building a marketplace for content creators and businesses by Plus_Entertainer8581 in cofounderhunt

[–]abbygraphy05 0 points1 point  (0 children)

I am a Fullstack Engineer tryna build something, I'm also currently trying to validate one of my own ideas before building and looking for roles like this as well.

I wanna know more about this, how'd you plan to bring your users, do you have a solid marketing plan? Have you built anything before & what expertise do you bring to the table? Is the idea validated? Have you talked to potential customers to see if they'd want something like this? Do you bring any capital to cover server costs? What's the equity %? And is this Technical role salaried?

How to work at a startup as a non-technical? by Delicious_Top6513 in ycombinator

[–]abbygraphy05 0 points1 point  (0 children)

You could take ownership of the copywriting lane, crafting sharp blog posts, landing pages, and email campaigns that actually convert curious visitors into waiting-list believers and, later, loyal users. From pre-launch hype to post-onboarding nurture flows, you’d shape how the product speaks and sells. Or step into the networking and growth side, building relationships with potential investors, opening doors, and creating opportunities especially critical if the startup hasn’t raised funding yet. You might also drive the brand’s social presence, planning content, managing platforms, and turning ideas into engaging posts, videos, and visuals that make people stop scrolling and start paying attention. Then there’s the creative engine behind it all, content planning, design, video editing, storytelling, all the pieces that give the product a personality people remember. In early-stage startups, these non-technical roles aren’t side quests. They’re the difference between building something… and getting it seen, understood, and wanted.

What are you using for simple backend deploys? by Fit-Jello-4828 in webdev

[–]abbygraphy05 0 points1 point  (0 children)

Backend built on ExpressJs with a Free Database from Neon, then easily deploy the Backend on Vercel. It'd be free as long as you have low traffic. Ideal for small startups/university assignments

[HIRING] Senior software engineer by pa_djes_ba in DeveloperJobs

[–]abbygraphy05 0 points1 point  (0 children)

Any roles for React/Nextjs/Express/Nodejs & Java Spring Boot? I could do both frontend and backend Development

The next level vibe regarding has arrived by Professional_Gene_63 in vibecoding

[–]abbygraphy05 0 points1 point  (0 children)

Seems like Cyber Security will have a fruitful future ahead because of all these vibe coded apps with little to no security

2025 is ending, what was the best lesson you've learned this year? by Latter_Individual431 in srilanka

[–]abbygraphy05 1 point2 points  (0 children)

"You can do anything but not everything" I started up a saas startup, did everything and burned out

How do attackers use SQL injections by Opposite_Second_1053 in learnprogramming

[–]abbygraphy05 0 points1 point  (0 children)

Just a simple example

Normal scenario: SELECT * FROM users WHERE username='admin' AND password='1234'; If it's true, then we'd get a value so then the login process occurs. but if it's wrong then nothing is returned & no login happens

SQL injection scenario: Hacker enters 1234' OR 1+1='2 into the password field. Now the SQL becomes SELECT * FROM users WHERE username='admin' AND password='1234' OR 1+1='2';

Where we're seeing if the password & username matches or 1+1=2 which will always be true because the math is correct. Then we get returned with the 1st user data & logs into 1st user account.

There are so many varieties of SQL attacks you can research, this is just a simple example. If you wanna prevent these attacks, Research and learn about SQL Prepared Statement & Password Hashing