You can filter posts by date, tag or even use natural language to find whatever you want
Most popular tags
Recent posts
Things You'd Rather Not Know About AWS S3
The article on the Plerion blog highlights often overlooked aspects of Amazon S3, including cost management, security, and data versioning. The author stresses the importance of understanding these topics to avoid future issues.
Headless terminal - a simple wrapper for terminal applications
'ht' is a lightweight interface for building HTTP applications in Go, promoting simplicity and efficiency.
How to bypass the ban on using your own Wi-Fi routers at the university?
The article discusses methods for bypassing bans on using WiFi routers, focusing on VPNs, tethering, and suitable hardware configurations.
How to Build Anything Quickly? - Speedrunning Method
The article discusses quick learning techniques like the pomodoro technique and active recall that help in efficient knowledge acquisition.
Virtual Scarecrow - Malware Slayer? (Windows)
Cyber Scarecrow is a cybersecurity blog providing tips and threat analyses in the IT world.
If you mention AI one more time, I'll do something to you! - thoughts of a skeptic
The article critically assesses the impact of artificial intelligence on society, calling for moderation in its use.
AI_Devs 3.0 - Programming and Automation in Pair with AI [self-promotion]
The article discusses the use of artificial intelligence in business, highlighting benefits and practical examples across various fields.
How thieves try to convince victims to unlock their iPhone?
The article recounts the author's experience after his phone was stolen and how the thieves tried to convince him to unlock it through texting. It highlights the ease of falling victim to such schemes.
The European Union returns with the topic of 'Chat Control' - is surveillance coming?
The EU plans to implement online monitoring to enhance children's safety. The article discusses privacy and freedom of speech concerns related to this regulation, which is controversial in society.
Credential Data Leak Using Compromised Subdomains
The article discusses the risks of credential leaks due to subdomain takeovers and suggests protective measures.
Source of content in this blog is https://news.mrugalski.pl
All content including posts, their short version, tags and video transcriptions is 100% AI generated