I Recreated LEETCODE (but worse)

Поділитися
Вставка
  • Опубліковано 6 жов 2024
  • Link to Fearless(social media app to deal with your fears):- fearlesssocial...
    Follow me on Instagram:- / reels
    In this series, we'll walk you through every step of the startup journey, from ideation to execution, helping you turn your concept into a thriving business in record time. Discover insider tips, practical advice, and actionable strategies from industry experts who've been there and done that.Learn how to validate your idea, create a minimum viable product (MVP), build a killer team, secure funding, and much more-all within the span of a single week. No fluff, no time wasted-just straight-to-the-point guidance to get your startup off the ground and soaring towards success.Subscribe now and join us on this exhilarating journey as we demystify the startup process and empower you to make your entrepreneurial dreams a reality. Don't wait any longer-let's launch your tech startup together!

КОМЕНТАРІ • 2

  • @ValorantInSpecter
    @ValorantInSpecter Місяць тому +2

    2:27 what of the user write a malware and run it in ur server ?

    • @shivampande8916
      @shivampande8916 Місяць тому +1

      Most of the code and libraries are abstracted from the user, only a certain function can be altered by the user. Also i am using a online api writing malware wont be of that effect if he can wrote one given the constrains as he does not have control over what libraries are imported