Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

XSS Vulnerability Found in Proton Mail - Incident Description

ProtonMail faces security vulnerabilities that may expose users' email addresses. The article discusses specific bugs, their implications, and the team's response to security concerns.

Phishing/Vishing as a Service? - a new tool in the hands of scammers

Twitter post discusses young programmers' success and the importance of programming education in schools.

How to handle slow HTTP requests in ServerLess environments?

The article presents the challenges of waiting for slow HTTP responses in serverless architecture and suggests various strategies that can be employed in such situations.

Explanation of the PostgreSQL meme - what's with this secret knowledge?

The article discusses PostgreSQL memes and their educational role regarding databases. These memes make complex topics more accessible and learning more fun and engaging.

Cosmic elevator - a visualization of what we have above us (entertainment)

The article explores the idea of a space elevator that could revolutionize space transport. The author discusses technical challenges and potential advantages of this innovative concept.

Analysis of the activity of Polish IT/security services - which publishes the most?

The article discusses the significance of the trusted third party in the context of online security. It highlights the risks associated with misinformation and emphasizes the need for a critical approach to published content.

History of Internet Cafés in Nepal

The article describes internet cafes in Kathmandu, their significance, and evolution in the smartphone era. These cafes have become important social hubs.

How to find time to learn new things after work?

The article focuses on strategies for learning after work, emphasizing planning, setting priorities, and using technology to enhance learning efficiency.

AI Devs - Training on Integrating IT Systems with Artificial Intelligence [sponsored]

AIDEVS is a platform focused on artificial intelligence, offering courses and resources for businesses.

What percentage of websites 'leak' their source code, logins, passwords, and keys?

The article outlines how 4,500 of the top million websites leaked source code secrets. This issue highlights the lack of protection and security practices in the industry, which poses serious threats to both users and website owners.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated