Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Find Dark Patterns - a game teaching to recognize manipulation in design

The article discusses dark patterns - manipulative user interface designs that mislead users. Examples include fake buttons and difficult opt-out options. This phenomenon erodes user trust and leads to unethical practices.

Operator - AI assistant for tasks in the browser

The article by OpenAI presents the Operator, a tool that enhances interactions with AI models. It simplifies complex queries and improves result interpretation, making artificial intelligence more accessible to all users.

What 2778 Researchers Think About the Further Development of AI? - Study Results (PDF, 39 Pages)

The article explores various opinions on the future of AI alongside challenges like ethics and regulations.

Cookie Sandwich Technique for Stealing HttpOnly Cookies

The article discusses the 'cookie sandwich' technique for stealing HttpOnly cookies, explaining how attackers exploit it within web applications.

A Deeper Look at DeepSeek and Its Impact on AI Technology

The "DeepSeek FAQ" article on Stratechery outlines the benefits of the new data analysis platform, DeepSeek. It emphasizes its applications and advantages across various industries.

Collection of Application Templates for Portainer

Portainer Templates is a tool for managing Docker containers using simple templates, enabling quick application deployment without manual configuration.

Why sorting in JS is harder than it seems?

The article discusses the challenges of data sorting in computer science, highlighting the complexities of various sorting algorithms and their application.

DeepSeek accidentally became more "open" than planned - data leak

The article highlights Wiz's research uncovering a security loophole in the DeepSeek database. Experts stress the need for better protection and auditing to prevent similar incidents in the future.

ECMAScript Proposal: Escaping Characters for RegExp

The article discusses using the escape function related to regular expressions in JavaScript, emphasizing the importance of web application security.

Critical Vulnerability in Subaru Starlink System - Remote Control and Vehicle Tracking

Sam Curry's article explores how to remotely access Subaru's system, detailing steps, tools, and ethical considerations in hacking.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated