Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

How Cloudflare Blocked a Record DDoS Attack of 7.3 Tbps

Cloudflare successfully blocked a massive 7.3 Tbps DDoS attack in 2020, showcasing its robust defense technology. Techniques like traffic dispersion effectively protected clients.

Is now the best time to learn programming?

The article analyzes the impact of military operations on society and politics, highlighting ethical dilemmas and the lasting consequences of leaders' decisions.

How I Use the Terminal? - Advanced Workflow with tmux, zsh, and nvim

Jyn's article outlines efficient terminal usage, highlighting command configuration, interface aesthetics, and essential tools like fish shell or zsh. It provides practical tips to enhance daily productivity and comfort at work, encouraging personalization of the workspace and exploration of new terminal techniques.

Quality Standard of AI-Generated Code in 2025 - Report from Qodo

The 'State of AI Code Quality' report outlines methods and tools assisting in automating code quality improvement in programming.

Why Raspberry Pi 4 may be too slow as a server?

The article addresses issues with slow restoration on Raspberry Pi and suggests ways to improve process efficiency.

Why point-by-point argumentation can be harmful in technical discussions

Sean Goedecke critiques the 'point-by-point' teaching method in programming, advocating for a holistic approach instead.

Free OWASP Top 10 Course with Practical Labs (3+ hours of videos and labs)

OWASP aims to improve application security. It provides support and resources for developers.

Efficient and Reliable VPS Servers for Professional and Hobbyist Applications [sponsored]

The article discusses how cloud computing affects local businesses and why adopting cloud technologies is essential for competitiveness.

How do 'residential proxies' work and why have they become the foundation of cybercrime?

The article highlights the rise of residential proxies and their implications on cyber risk management. These proxies use real IP addresses which makes them difficult to detect. This poses challenges for businesses regarding risk assessment and effective security strategies.

Why it is worth building teams for "ordinary" engineers?

The article praises 'normal engineers' who ensure the stability and efficiency of technological systems. Their contribution to daily user experiences is often overlooked, despite being vital for the smooth operation of technological solutions.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated