You can filter posts by date, tag or even use natural language to find whatever you want
Most popular tags
Recent posts
How SQL Query Planning Works - Visualization of PostgreSQL Decisions
The article discusses key aspects of query optimization in databases, highlighting methods to enhance performance.
Will changes in the HTML specification protect against mXSS attacks?
The article addresses security techniques against Mutation XSS attacks and the role of escaping in HTML attributes. The author offers practical examples showing how improper formatting can lead to security vulnerabilities.
What you should know before you start using ARIA in HTML code?
The article discusses key rules for using ARIA in creating accessible web applications. The author shares insights emphasizing the proper use of ARIA and semantic HTML tags. Tips provided encourage testing and continuously improving interfaces from the perspective of users with disabilities.
iPhone 8 as a solar-powered OCR server?
The article describes a project combining the iPhone 8 with OCR technology and solar power, offering an innovative and sustainable approach to text processing.
Why do we need DNSSEC and what does it actually do?
The article discusses the importance of DNSSEC in enhancing Internet security by cryptographically signing DNS data, which protects against spoofing attacks.
How does PWM flicker in LEDs affect our health?
The article examines the impact of invisible light on health and suggests better lighting options.
Get one of 3 free courses + take advantage of the promotion [sponsored]
VideoPoint10 is a video meeting management app, providing users with many useful features.
How BEM, utility classes, and cascading layers handle property overriding in CSS
The article on Smashing Magazine presents new cascade layers in CSS that change the way styles are managed. They enable developers to effectively combine techniques like BEM and utility classes, streamlining control over specificity and style hierarchy.
How to Write Documentation with AI and RAG Systems in Mind?
The article on Kapa.ai presents best writing practices with a focus on clarity, structure, revision, and audience adaptation. The insights shared aim to enhance the writing and communication skills of users.
How to use Self-XSS as a full-fledged XSS attack through credentialless iframes?
The article discusses Self-XSS technique and its dangers, highlighting how users can fall victim. It stresses the importance of security and protecting personal data online.
Source of content in this blog is https://news.mrugalski.pl
All content including posts, their short version, tags and video transcriptions is 100% AI generated