You can filter posts by date, tag or even use natural language to find whatever you want
Most popular tags
Recent posts
How to Trace Malware Infrastructure? - Basics
The article discusses the basics of tracking malware infrastructure, including methods for identifying and analyzing threats and tools for monitoring malicious activities.
Copenhagen Book - Safety Recommendations for Applications
The Copenhagen Book connects literature with Copenhagen, promoting authors and cultural events. It serves as a key point for the literary community in Denmark.
The Man Who Broke Google - Sometimes Money Can Obscure the Purpose of a Product
The article discusses factors influencing the decline of Google's dominance in the tech industry, including competition and privacy changes.
The toughest web problem - centering elements!
The article discusses centering techniques for UI elements, highlighting CSS methods like flexbox and grid while offering tips for web developers.
How I Took Down the Trusted Third Party - Episode 1
The article emphasizes the critical need for securing web forms against attacks with real-life examples and practical tips for better security practices.
"I Accidentally Created a Meme Search Engine" - an Interesting Experiment
The article discusses the creation of a search engine for memes, highlighting challenges related to content indexing and the use of AI. The author shares his experiences and the practical applications of the project.
37signals Guide to Internal Communication in the Team
The article 'How We Communicate' emphasizes the importance of effective internal communication in companies, highlighting the clarity of information and the use of appropriate tools.
Tor: From the Dark Web to the Future of Privacy (ebook, 243 pages)
The book 'Tor: From the Dark Web to the Future of Privacy' examines Tor technology and its role in ensuring online privacy. The authors discuss the benefits and risks associated with anonymous web browsing.
The Forgotten History of Pagers and the War Against Them
The article 'The Forgotten War on Beepers' examines the history of pagers, their role in communication, and their impact on society. It emphasizes how this technology influenced norms around speed and mode of communication, as well as interpersonal relationships.
Linux Exploit Suggester - tool for system exploitation
Linux Exploit Suggester is a tool for identifying security vulnerabilities in Linux systems.
Source of content in this blog is https://news.mrugalski.pl
All content including posts, their short version, tags and video transcriptions is 100% AI generated