Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Overview of Low-Level Programming Languages for 2024

The article provides an overview of system languages, their uses, and characteristics in programming context. It also discusses trends and the future of these languages.

Comparison of UUIDv4 and ULID - Identifiers for Modern Systems

The article discusses the differences between UUIDv4 and ULID. ULID is a more flexible and scalable identifier that allows for better sorting and data management. The author presents the benefits of its use in projects.

Comparison of USB-C cables - Apple Thunderbolt 4 vs cheaper alternatives

The article compares USB-C cables and chargers, specifically Apple Thunderbolt and Amazon Basics, evaluating their quality, performance, and durability.

ShareDrop - a modern solution for file transfer

Sharedrop is a file-sharing application that allows users to share files via a web browser. It enables direct file transfers between devices without installation. It supports multiple platforms and is a safe, quick solution for users.

Ransomchats - what real ransom negotiations with ransomware creators look like

Ransomchats is an application for analyzing chat logs related to ransom demands, useful in studying cybercrime.

Basics of Turing Machines - how it works and what it is about? (interactive article)

The article discusses Turing machines, computational models developed by Alan Turing that are crucial for algorithm theory. It includes explanations of their complexity and applications in computational problem analysis.

Using McDonald's API to Take Over Orders and Place an Order for One Cent

The article reveals a hacking incident involving McDelivery in India, highlighting vulnerabilities in digital security within restaurants. It stresses the need for improved online system security in the food industry.

KeePass - how to synchronize passwords across different platforms

The AVLAB article presents how to securely manage passwords using KeePass. It emphasizes the importance of unique passwords, two-factor authentication, and software updates. Providing practical advice on data protection and digital security, it serves as a valuable resource for all Internet users.

Stream Deck Plus - reverse engineering of the hardware

The article discusses the reverse engineering of the Stream Deck Plus, focusing on analyzing communication and customizing the device.

Problem Driven Development - how to define a technical roadmap based on problems

The article discusses Problem-Driven Development (PDD), an approach focused on understanding problems rather than technologies. PDD aids in creating user-centered software that enhances usability.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated