Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

What is HDR exactly and how does it work in photography?

HDR is a photography technique that combines multiple images at different exposures to achieve a wider dynamic range and detail.

Are binary formats better than JSON in browsers?

Adam Faulkner's article on binary formats in browsers offers an intriguing perspective on the competition between binary data formats and JSON. Noting that binary formats can be more efficient regarding processing and data size, the author encourages developers to consider their use. While JSON is prevalent and easy to use, Faulkner highlights the advantages of formats like Protobuf or MessagePack, especially in high-performance applications. In the article's conclusion, the author emphasizes the importance of informed decision-making regarding the chosen format's use case.

How do passkeys work and are they really resistant to phishing?

Troy Hunt's article discusses passkeys as a new login method that eliminates the need to remember passwords. Utilizing a cryptographic key technology, users enjoy enhanced security and simplicity in logging in.

Coding without a laptop - two weeks of working with AR glasses and Linux on Android

The article discusses how to run Linux on Android with AR glasses, offering practical tips and resources.

Selling resources on your home server is a BAD idea

The article warns against selling space in homelabs, urging a focus on learning and passion.

History and Evolution of the Game Asteroids from Atari

The article describes Atari's Asteroids game, its innovative concept, and its impact on pop culture. Released in 1979, the game became an arcade icon, drawing millions of players over the decades.

Do LLMs make me dumber?

Vincent's article examines the negative impact of language models on our thinking skills. Instead of developing critical abilities, we rely on AI, potentially leading to intellectual regression. The author urges the maintenance of independent thinking skills.

Have I Been Pwned with a New Interface and Features - HIBP 2.0 Has Launched

Troy Hunt launched HIBP 2.0, a new version of the tool that allows checking if personal data has been breached. New features provide better privacy protection and are more user-friendly.

Detection of Malicious Unicode Characters in Source Code

Daniel Haxx's article focuses on detecting malicious Unicode encoding, which poses serious threats in cybersecurity. The author discusses monitoring techniques for suspicious sequences and the significance of input validation. Examples of malicious sequences and analysis methods are crucial for application protection.

What does data retention look like in EU countries and why does the situation in Poland raise concerns?

The article reviews data retention practices in EU countries, emphasizing the differences in approaches to citizen privacy and calling for greater harmonization of European regulations.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated