Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Advanced Work in CyberChef - Malware Configuration Extraction

The article details advanced CyberChef operations in relation to NetSupport, showcasing how this tool can be utilized for data analysis and security.

State of CI/CD - research report (PDF, 47 pages)

The 'State of CICD' report from CNCF analyzes the current landscape of CI/CD tools and their importance in automating software development processes.

Can you recognize your favorite artist's songs in 5 seconds? (entertainment)

Music Nerd is a site for music lovers offering articles, reviews, and analyses of various genres.

10 Must-Read Books for Tech Leads

The article shares a list of 10 key books vital for engineering leaders, featuring both classics and modern works that help develop leadership skills.

Guide to Secret Management in AWS Lambda

The article 'Ultimate Lambda Secrets Guide' discusses managing secrets in AWS Lambda, focusing on security and practical examples.

List of IPs associated with botnets - for blocking

C2-Tracker is a tool for monitoring malicious C2 servers that enhances network security by analyzing and detecting threats.

Check the security of public cryptographic keys

Bad Keys is a site discussing cryptographic key security and management practices.

Open source and self-hosted alternative to ngrok

Portr is a platform for automating task documentation in programming, offering integrations and an intuitive interface.

When do we stop discovering new music? - an analysis of statistics

The article analyzes why we tend to stop discovering new music over time. It points to the impact of streaming service algorithms that limit the diversity of suggested tracks. The author emphasizes that psychological aspects, such as fear of disappointment, affect our music preferences. It encourages conscious searching for variety and exploring new music genres. Ultimately, discovering new artists can be an extraordinary journey into the world of sounds.

How I Took Down the Trusted Third Party - Episode 1

The article emphasizes the critical need for securing web forms against attacks with real-life examples and practical tips for better security practices.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated