Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

What is scope in CSS and how to use it sensibly?

The article discusses the concept of scope in CSS, emphasizing its importance in managing styles and avoiding conflicts. It includes practical examples and tips for designers.

Host Header Injection Attack in Password Reset Link

The article discusses how to exploit host header injection in password reset links to take over user accounts. It provides detailed instructions and security recommendations.

Use traffic mirroring to debug microservices in a production-like environment

The article discusses traffic mirroring for microservices in Istio within a VPC, allowing for testing new services with minimal production risk.

Open Source LLM Database - Comparison of Models from Amazon, Google, Microsoft, and Others

Models.dev is a resource for AI tools and models.

Analysis of Adversary-in-the-Middle (AitM) Phishing Attacks and Their Ecosystem

The SEKOIA blog article analyzes AiTM phishing threats, describing cybercriminal techniques and the importance of security measures.

How Pinterest Implemented the Docs-as-Code Strategy and Built Its Own PDocs Tool

Pinterest implemented docs-as-code, improving the quality and currency of technical documentation by integrating it with the programming process.

How a poorly configured cache brought down the entire system

The article addresses issues related to misconfigured caching, which can lead to delays and unpredictable application behavior.

Reactive Signals in Python - how to use them and when they make sense?

The article discusses state management using signals for Python developers, offering practical advice and examples. Ideal for all skill levels.

Does frequent re-login worsen security?

Tailscale discusses the issue of frequent reauthentication, analyzing its impact on both security and user comfort. It suggests a balanced approach to data protection.

Network Interface Configuration in Linux - Guide

The article covers configuring network interfaces in Linux, discussing configuration files and commands.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated