<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Hima Kartikeya Naidu</title>
    <description>The latest articles on Forem by Hima Kartikeya Naidu (@hkn_2011).</description>
    <link>https://forem.com/hkn_2011</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3099606%2F91f56c7d-c56b-4f91-a393-08b20d83a00b.jpg</url>
      <title>Forem: Hima Kartikeya Naidu</title>
      <link>https://forem.com/hkn_2011</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/hkn_2011"/>
    <language>en</language>
    <item>
      <title>🚀 A Beginner’s First Look at Project IDX: Secure Coding from Day One</title>
      <dc:creator>Hima Kartikeya Naidu</dc:creator>
      <pubDate>Thu, 21 May 2026 11:35:58 +0000</pubDate>
      <link>https://forem.com/hkn_2011/a-beginners-first-look-at-project-idx-secure-coding-from-day-one-1863</link>
      <guid>https://forem.com/hkn_2011/a-beginners-first-look-at-project-idx-secure-coding-from-day-one-1863</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/google-io-writing-2026-05-19"&gt;Google I/O Writing Challenge&lt;/a&gt;&lt;/em&gt; &lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;em&gt;Hey everyone! 👋 Hima Kartikeya here!&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I just finished my Class 10 ICSE board exams and I am getting ready to start my polytechnic diploma journey in Andhra Pradesh. My absolute dream is to build a career in &lt;strong&gt;Cyber Security&lt;/strong&gt;, but to keep my creative side active, I’m also a small-scale indie game developer. &lt;/p&gt;

&lt;p&gt;Right now, my programming baseline is mastering loops in Python and C, alongside basic Java concepts. While watching the &lt;strong&gt;Google I/O 2026&lt;/strong&gt; keynotes and going through the developer documentations, one specific release completely blew me away: the massive new upgrades to &lt;strong&gt;Google Project IDX&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;As a beginner who cares about security, I don't just want an IDE that helps me write code faster—I want a workspace that helps me write code &lt;em&gt;safer&lt;/em&gt;. Here is my perspective on why Project IDX is a game-changer for student developers.&lt;/p&gt;




&lt;h2&gt;
  
  
  🌐 The Magic of Isolated Cloud Sandboxing
&lt;/h2&gt;

&lt;p&gt;When you are learning low-level languages like C, managing memory manually is a massive hurdle. One wrong line of code can trigger a logic error, cause a memory leak, or create an accidental infinite loop that freezes your entire system. &lt;/p&gt;

&lt;p&gt;The Google I/O announcements highlighted Project IDX’s advanced, browser-based &lt;strong&gt;virtualized Nix environments&lt;/strong&gt;. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Why it matters to a beginner:&lt;/strong&gt; It means I can test risky code, write complex loops, and build game scripts in an environment that is entirely separated from my actual computer hardware. If I accidentally create a code block that mimics a Denial of Service (DoS) attack or causes a memory crash, it happens safely inside Google’s cloud sandbox without putting my own machine at risk. It turns the workspace into a safe playground for testing security limits.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧠 Built-In Security Guardrails: Shifting Security Left
&lt;/h2&gt;

&lt;p&gt;What really caught my eye in the I/O 2026 livestream sessions was how Project IDX is integrating smarter AI-driven security linting right into the workspace. &lt;/p&gt;

&lt;p&gt;In my indie game dev practice, I realized how easy it is to leave variables unprotected, allowing a player to easily tamper with game data (like editing health or coin values in memory). The new code-assistance features in IDX don't just autocomplete your loops; they actively flag potential vulnerabilities as you type.&lt;/p&gt;

&lt;p&gt;If my code blindly trusts client-side input or lacks a proper validation check, the workspace alerts me &lt;em&gt;before&lt;/em&gt; I deploy. This teaches a student like me the most important rule of modern cyber security: &lt;strong&gt;Security isn't something you patch onto a project at the very end; it belongs to the creator from line one.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  💡 My Critique &amp;amp; Takeaway
&lt;/h2&gt;

&lt;p&gt;A lot of the hype around modern developer tools focuses on pure speed and corporate automation. But for students, beginners, and indie creators, the entry barrier to setting up a secure, properly configured local environment is incredibly high. &lt;/p&gt;

&lt;p&gt;By making a powerful, cloud-sandboxed environment completely accessible through a browser tab, Google is democratizing secure development. My only critique is that I want to see even deeper integrations for local game engine compilers in the cloud workspace moving forward!&lt;/p&gt;

&lt;p&gt;Stepping into my diploma journey, I won't just be using textbooks to learn security theory. I'll be spinning up workspaces in Project IDX to actively break and defend my own code in real time. &lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Over to the Community:&lt;/strong&gt;&lt;br&gt;
For the seasoned developers and security experts out there: Have you experimented with Project IDX yet? What is your favorite workspace tool for safely testing untrusted code or debugging complex loops? Let’s talk in the comments! 🚀👇&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>googleiochallenge</category>
      <category>security</category>
      <category>beginners</category>
    </item>
    <item>
      <title>🤖 The Hacker in the Machine: Using AI Agents to Build Interactive Security Games</title>
      <dc:creator>Hima Kartikeya Naidu</dc:creator>
      <pubDate>Thu, 21 May 2026 11:19:47 +0000</pubDate>
      <link>https://forem.com/hkn_2011/the-hacker-in-the-machine-using-ai-agents-to-build-interactive-security-games-471n</link>
      <guid>https://forem.com/hkn_2011/the-hacker-in-the-machine-using-ai-agents-to-build-interactive-security-games-471n</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/hermes-agent-2026-05-15"&gt;Hermes Agent Challenge&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;em&gt;Hey everyone! 👋 Hima Kartikeya here again!&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you’ve seen my recent posts, you know I just finished my Class 10 ICSE board exams and I’m currently getting ready to start my polytechnic diploma journey. My ultimate dream is a career in Cyber Security, but on the side, I’m a small-scale indie game developer who loves storytelling and world-building.&lt;/p&gt;

&lt;p&gt;When I saw the &lt;strong&gt;Hermes Agent Challenge&lt;/strong&gt;, my brain didn't just think about standard business automation or data spreadsheets. I immediately wondered: &lt;strong&gt;How can we use autonomous AI Agents to revolutionize the way we learn cyber security through interactive gaming?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When most people think of AI, they think of chat interfaces waiting for a prompt. But &lt;strong&gt;AI Agents&lt;/strong&gt; are a completely different beast—they can think ahead, adapt to changes, use external tools, and execute a multi-step plan entirely on their own. Here is my concept for how indie creators can use agent frameworks to build the ultimate Cyber Security RPG.&lt;/p&gt;




&lt;h2&gt;
  
  
  🎮 The Core Concept: An Autonomous Virtual Adversary
&lt;/h2&gt;

&lt;p&gt;Imagine a text-based terminal game where you play as a junior system administrator defending a simulated corporate network. Instead of fighting a static, pre-scripted game boss with predictable patterns, your opponent is a live &lt;strong&gt;AI Adversary Agent&lt;/strong&gt; powered by Hermes.&lt;/p&gt;

&lt;p&gt;The setup is simple but dynamic. The agent is given a strict goal: &lt;em&gt;"Find a vulnerability in the player's network configuration and exfiltrate the secret data flag."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The game loop unfolds in real-time:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;The Agent Probes:&lt;/strong&gt; The AI agent reads the current state of the game network (represented as environment variables or system logs).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Agent Acts:&lt;/strong&gt; It dynamically decides to execute a virtual "port scan" or try to exploit a weak variable handler.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Player Reacts:&lt;/strong&gt; The player sees the incoming connection logs and has to quickly write Python fixes, patch vulnerable loops, or close ports to stop the intrusion.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Because the agent can pivot and alter its strategy based on the specific defensive choices the player makes, no two playthroughs are ever identical!&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 Why Agent Reasoning Fits Perfectly with Game Logic
&lt;/h2&gt;

&lt;p&gt;What makes a framework like Hermes brilliant for this kind of game design is its native capability for complex &lt;strong&gt;Reasoning, Planning, and Tool Execution&lt;/strong&gt; (often called the ReAct framework). &lt;/p&gt;

&lt;p&gt;Instead of a developer hardcoding millions of lines of complex "if/else" logic to simulate a smart hacker, the agent handles the decision-making loop naturally:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Observation:&lt;/strong&gt; The agent checks the game state (&lt;em&gt;"The player left a loop configuration unprotected on Port 80"&lt;/em&gt;).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Thought:&lt;/strong&gt; It processes the logic (&lt;em&gt;"An open port with unvalidated input means I can try to trigger a buffer overflow or a local Denial of Service"&lt;/em&gt;).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Action:&lt;/strong&gt; It calls a specific virtual terminal tool within the game environment to execute the exploit.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For a student developer like me, this completely changes the scope of what is possible. It democratizes game AI, letting indie creators focus entirely on crafting deep narratives, realistic environments, and great educational security lessons.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;em&gt;💡 Final Thoughts: The Ultimate Classroom&lt;/em&gt;
&lt;/h2&gt;

&lt;p&gt;Stepping into my diploma studies soon, I know that reading static security textbooks can sometimes get a bit dry. But when you transform that textbook into a living, breathing digital opponent—an autonomous agent actively trying to outsmart your code—learning secure programming habits becomes an addictive, competitive experience.&lt;/p&gt;

&lt;p&gt;Tools like Hermes prove that open agentic systems aren't just for automating corporate tasks. They are powerful platforms for building next-generation educational tools that can help train the next wave of security defenders.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Over to the Community:&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
To the senior developers, game designers, and AI engineers out there: If you were integrating an autonomous AI agent into a video game today, would you design them to be a clever ally helping the player guide the narrative, or an unpredictable adversary trying to beat them? &lt;br&gt;
Let’s brainstorm in the comments! 🚀👇&lt;/p&gt;

</description>
      <category>hermesagentchallenge</category>
      <category>devchallenge</category>
      <category>agents</category>
      <category>gamedev</category>
    </item>
    <item>
      <title>🎮 Local AI in Game Dev: Why Gemma 4 Changes the Game for Indie Creators</title>
      <dc:creator>Hima Kartikeya Naidu</dc:creator>
      <pubDate>Thu, 21 May 2026 10:48:23 +0000</pubDate>
      <link>https://forem.com/hkn_2011/local-ai-in-game-dev-why-gemma-4-changes-the-game-for-indie-creators-4f7a</link>
      <guid>https://forem.com/hkn_2011/local-ai-in-game-dev-why-gemma-4-changes-the-game-for-indie-creators-4f7a</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/google-gemma-2026-05-06"&gt;Gemma 4 Challenge: Write About Gemma 4&lt;/a&gt;&lt;/em&gt; &lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;em&gt;Hey everyone! 👋 Hima Kartikeya here again.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you saw my last post, you know I just finished my Class 10 ICSE exams and I'm gearing up for my polytechnic diploma. While my main goal is Cyber Security, I spend a lot of my free time as a small-scale indie game developer, messing around with storytelling and building virtual worlds.&lt;/p&gt;

&lt;p&gt;When Google dropped &lt;strong&gt;Gemma 4&lt;/strong&gt;, most of the tech world immediately started talking about massive enterprise cloud servers. But as a budget-conscious indie creator, my brain went somewhere totally different: &lt;strong&gt;What does a powerful AI model that can run completely locally, offline, on a normal computer mean for video games?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you've ever looked into adding smart AI to a game, you know cloud API costs are a massive headache for a student. You basically have to pay every time an NPC speaks! But Gemma 4 changes the math completely. Here is why I think this model family is a massive deal for indie devs:&lt;/p&gt;




&lt;h2&gt;
  
  
  1. Massive Memory for NPCs (The 128K Context Window)
&lt;/h2&gt;

&lt;p&gt;One of my biggest pet peeves in games is when Non-Player Characters (NPCs) instantly forget what you did two minutes ago because they are stuck on a rigid, pre-written script. &lt;/p&gt;

&lt;p&gt;Gemma 4’s lightweight models come with a massive &lt;strong&gt;128K context window&lt;/strong&gt;. To put that in perspective, that’s like fitting a whole 90,000-word book into the model's short-term memory! &lt;/p&gt;

&lt;p&gt;Instead of an NPC recycling the same generic lines, you can feed the entire game's lore, the player's past choices, and the character's personality straight into the local model. An NPC could actually remember that you accidentally attacked their shop three chapters ago and completely change how they treat you. And because it runs locally on the player's hardware, it costs the developer absolutely nothing.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. No More Awkward Pauses (Multi-Token Prediction)
&lt;/h2&gt;

&lt;p&gt;In gaming, lag completely ruins the immersion. If you talk to an AI character and have to sit there for 4 seconds waiting for the text to generate, the magic is gone.&lt;/p&gt;

&lt;p&gt;Gemma 4 uses a neat architectural upgrade called &lt;strong&gt;Multi-Token Prediction (MTP)&lt;/strong&gt;. Basically, instead of guessing the next word one by one, it predicts multiple tokens at the same time. On standard consumer hardware and mobile setups, this translates to huge speed improvements. The dialogue can stream out almost instantly, making real-time conversations with virtual characters actually feel fluid.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Games That Can "See" (Native Multimodal Processing)
&lt;/h2&gt;

&lt;p&gt;These new models aren't just for text—they process images natively too. Imagine building a puzzle game or an RPG where a player can upload a custom sketch, a flag they designed, or an image from their room, and the game world dynamically reacts to it. Gemma 4 can analyze those visual details completely offline, which opens up wild possibilities for new gameplay mechanics.&lt;/p&gt;




&lt;h2&gt;
  
  
  💡 Final Thoughts
&lt;/h2&gt;

&lt;p&gt;Starting my polytechnic journey soon while watching tech like Gemma 4 drop makes me incredibly excited to be learning how to code right now. It proves that you don't need a massive data center or a million-dollar budget to build something incredibly smart. &lt;/p&gt;

&lt;p&gt;Whether you are writing simple loops in Python, managing memory in C, or designing a text-based indie RPG, local open models mean we can build without boundaries. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Over to the Community:&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
To the senior game designers and AI developers out there: If you could give an NPC a massive memory and local vision today, what's the first gameplay mechanic you would build? Let's brainstorm in the comments! 🚀👇&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>gemmachallenge</category>
      <category>gemma</category>
      <category>gamedev</category>
    </item>
    <item>
      <title>Just wrapped up Class 10 ICSE and heading into my polytechnic diploma! 🚀 Here’s my beginner's take on how simple loops in Python &amp; C connect to massive Cyber Security vulnerabilities like DoS and data tampering. Let me know your thoughts! 👇</title>
      <dc:creator>Hima Kartikeya Naidu</dc:creator>
      <pubDate>Thu, 21 May 2026 10:11:19 +0000</pubDate>
      <link>https://forem.com/hkn_2011/just-wrapped-up-class-10-icse-and-heading-into-my-polytechnic-diploma-heres-my-beginners-take-21pi</link>
      <guid>https://forem.com/hkn_2011/just-wrapped-up-class-10-icse-and-heading-into-my-polytechnic-diploma-heres-my-beginners-take-21pi</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/hkn_2011/a-10th-graders-journey-why-cyber-security-starts-with-your-very-first-loop-j0o" class="crayons-story__hidden-navigation-link"&gt;A 10th Grader’s Journey: Why Cyber Security Starts with Your Very First Loop&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
      &lt;a href="https://dev.to/hkn_2011/a-10th-graders-journey-why-cyber-security-starts-with-your-very-first-loop-j0o" class="crayons-article__context-note crayons-article__context-note__feed"&gt;&lt;p&gt;Google I/O Writing Challenge Submission&lt;/p&gt;

&lt;/a&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/hkn_2011" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3099606%2F46f0a84f-cbcd-437e-a4f1-8fa97207e2d6.jpg" alt="hkn_2011 profile" class="crayons-avatar__image" width="96" height="96"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/hkn_2011" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Hima Kartikeya Naidu
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Hima Kartikeya Naidu
                
              
              &lt;div id="story-author-preview-content-3716123" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/hkn_2011" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3099606%2F46f0a84f-cbcd-437e-a4f1-8fa97207e2d6.jpg" class="crayons-avatar__image" alt="" width="96" height="96"&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Hima Kartikeya Naidu&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/hkn_2011/a-10th-graders-journey-why-cyber-security-starts-with-your-very-first-loop-j0o" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;May 21&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/hkn_2011/a-10th-graders-journey-why-cyber-security-starts-with-your-very-first-loop-j0o" id="article-link-3716123"&gt;
          A 10th Grader’s Journey: Why Cyber Security Starts with Your Very First Loop
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/devchallenge"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;devchallenge&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/googleiochallenge"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;googleiochallenge&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/beginners"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;beginners&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/cybersecurity"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;cybersecurity&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
            &lt;a href="https://dev.to/hkn_2011/a-10th-graders-journey-why-cyber-security-starts-with-your-very-first-loop-j0o#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            3 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
    </item>
    <item>
      <title>Leveling up from Class 10 ICSE to Polytechnic! Here is why I think even beginners need to look at code through a security lens. 👁️💻</title>
      <dc:creator>Hima Kartikeya Naidu</dc:creator>
      <pubDate>Thu, 21 May 2026 07:37:59 +0000</pubDate>
      <link>https://forem.com/hkn_2011/leveling-up-from-class-10-icse-to-polytechnic-here-is-why-i-think-even-beginners-need-to-look-at-4hma</link>
      <guid>https://forem.com/hkn_2011/leveling-up-from-class-10-icse-to-polytechnic-here-is-why-i-think-even-beginners-need-to-look-at-4hma</guid>
      <description>&lt;p&gt;&lt;strong&gt;Hey everyone! 👋&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I’m Ch Hima Kartikeya Naidu. I just finished my Class 10 from an ICSE school, and I’m about to start my diploma journey. My ultimate dream is to build a career in &lt;em&gt;Cyber Security&lt;/em&gt;, but on the side, I’m also a small-scale game developer who loves using storytelling and creativity to craft engaging narratives and virtual worlds.&lt;/p&gt;

&lt;p&gt;Since I'm just entering polytechnic, my programming peak right now is mastering loops Python and C. I aced basic Java in my academics. While learning how loops repeat actions to make games work, I started wondering: How do these same basic programming concepts connect to cyber security?&lt;/p&gt;

&lt;p&gt;Here is how I’m looking at security as a beginner dev:&lt;/p&gt;




&lt;h2&gt;
  
  
  1. When Loops Turn Into Security Flaws (Infinite Loops)
&lt;/h2&gt;

&lt;p&gt;In my classes, I learned how to use loops to repeat code until a condition is met. But what happens if a programmer makes a mistake and the loop never stops? It creates an infinite loop that freezes the software. In the security world, if an attacker finds a way to trigger an infinite loop on a server, they can crash the whole system. This is a basic form of a Denial of Service (DoS) vulnerability.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;My Lesson: Writing secure code starts with making sure your loops always have a foolproof exit strategy.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  2. Game Exploits vs. Real-World Hacking
&lt;/h2&gt;

&lt;p&gt;As a small-scale game dev, I know that if you don't secure your variables, players can use memory-editing tools to change their in-game currency or health from &lt;code&gt;10&lt;/code&gt; to &lt;code&gt;9999&lt;/code&gt;. In the cyber security world, this is very similar to a "Buffer Overflow" or memory tampering, where an attacker alters data in a computer's memory to make it do things it shouldn't.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;My Lesson: Whether it's a video game or a secure database, you can never trust what's happening on the client's side without validation.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  3. C Language and Memory Safety
&lt;/h2&gt;

&lt;p&gt;Learning C has been eye-opening because it forces you to manage memory yourself. A lot of famous cyberattacks happen because of vulnerabilities in C-based software where memory isn't handled safely.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;My Lesson: Learning loops and memory management in C right now isn't just academic—it's actually the first step to understanding how system-level exploits work.&lt;/li&gt;
&lt;/ul&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;💡 Final Thoughts:&lt;/strong&gt;&lt;br&gt;
I might only know the basics right now, but I'm realizing that you don't need to be a master hacker to start thinking about security. It starts with the very first loops and variables we learn in school. I can't wait to level up both my security knowledge and my game dev skills during my diploma!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;To the seniors in the community: &lt;br&gt;
What’s a basic coding habit you think every beginner should learn to write safer code from day one? &lt;br&gt;
Let’s hear it! 🚀&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>diplomabound</category>
      <category>beginners</category>
      <category>icsegrad</category>
    </item>
  </channel>
</rss>
