Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

The Story of Penetration Testing at a Medical Company and Its Interesting Finale (Twitter Thread)

Jhaddix shares insights on cybersecurity and vulnerability detection on Twitter. He highlights the importance of analyzing cybercriminal behaviors and securing systems effectively.

How I Monitor My Entire Life - The Case of Felix Krause

Felix Krause describes how he organized his life using a database, which helped him manage data and increase productivity.

Application Performance Optimization - How to Approach It?

The article presents key performance optimization strategies from 2022, focusing on cloud technology and containerization.

You can automate more things than you think

Hillel Wayne's article focuses on how automation can assist in everyday life and work. The author highlights that anyone can introduce automation into their routines, resulting in time savings and error reduction. The article encourages identifying tasks that can be automated and provides useful tools for this purpose.

Can you complete a line in Tetris when someone maliciously gives you the worst possible blocks?

The article discusses the application of adversarial attacks in Tetris, demonstrating how machine learning techniques can manipulate game algorithms.

Trends in DDoS Attacks in Q1 2021 - Analysis by Cloudflare

The article discusses DDoS attack trends in 2022, highlighting diversity and an increase in threats to cryptocurrency services.

What is the most popular Linux distribution? Not Ubuntu.

The article analyzes the decline in Ubuntu's market share, highlighting threats from competition and critical decisions by Canonical's management.

What is the minimum weight of a monochrome PNG file 256x256 and why is it worth considering this issue?

The author describes how they created the smallest PNG file, measuring just 1 byte. It includes technical aspects of headers and data structures, along with reflections on the aesthetics and functionality of graphic files.

HTTP Caching Headers - Everything You Need to Know

The article discusses cache-related headers like 'Cache-Control' and 'Expires', which aid in optimizing the performance of web services.

Trivy - vulnerability scanner in container images and GIT repositories

Trivy is a security scanning tool for container applications, helping detect vulnerabilities and configuration issues.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated