You can filter posts by date, tag or even use natural language to find whatever you want
Most popular tags
Recent posts
Advanced Work in CyberChef - Malware Configuration Extraction
The article details advanced CyberChef operations in relation to NetSupport, showcasing how this tool can be utilized for data analysis and security.
State of CI/CD - research report (PDF, 47 pages)
The 'State of CICD' report from CNCF analyzes the current landscape of CI/CD tools and their importance in automating software development processes.
Can you recognize your favorite artist's songs in 5 seconds? (entertainment)
Music Nerd is a site for music lovers offering articles, reviews, and analyses of various genres.
10 Must-Read Books for Tech Leads
The article shares a list of 10 key books vital for engineering leaders, featuring both classics and modern works that help develop leadership skills.
Guide to Secret Management in AWS Lambda
The article 'Ultimate Lambda Secrets Guide' discusses managing secrets in AWS Lambda, focusing on security and practical examples.
List of IPs associated with botnets - for blocking
C2-Tracker is a tool for monitoring malicious C2 servers that enhances network security by analyzing and detecting threats.
Check the security of public cryptographic keys
Bad Keys is a site discussing cryptographic key security and management practices.
Open source and self-hosted alternative to ngrok
Portr is a platform for automating task documentation in programming, offering integrations and an intuitive interface.
When do we stop discovering new music? - an analysis of statistics
The article analyzes why we tend to stop discovering new music over time. It points to the impact of streaming service algorithms that limit the diversity of suggested tracks. The author emphasizes that psychological aspects, such as fear of disappointment, affect our music preferences. It encourages conscious searching for variety and exploring new music genres. Ultimately, discovering new artists can be an extraordinary journey into the world of sounds.
How I Took Down the Trusted Third Party - Episode 1
The article emphasizes the critical need for securing web forms against attacks with real-life examples and practical tips for better security practices.
Source of content in this blog is https://news.mrugalski.pl
All content including posts, their short version, tags and video transcriptions is 100% AI generated