Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Google resigns from GSuite Legacy (free predecessor of Google Workspace) after 16 years - where to escape?

The UW team introduced a new data analysis tool that simplifies the process of analyzing large datasets and offers innovative visualization methods.

Collection of Docker Images with Applications for Network Security Testing

Houdini is a digital security analysis tool utilizing machine learning.

How to create your own non-fungible token (NFT)? Step by step

The article outlines how to create your own NFTs, discussing platforms and legal aspects involved in the process.

What does DevOps really do (or what should it do)?

The article about DevOps explains how this approach connects development and operations to enhance collaboration within technical teams, automate processes, and improve the quality of delivered software.

WallSmash - what if we combined Arkanoid with Frozen Bubbles? [online game]

WallSmash is a project management platform that helps teams collaborate efficiently.

CSS Speedrun - do you know CSS? Try to solve (in time!) 10 'simple' tasks

CSS Speedrun is a platform for practicing CSS skills through challenges. It provides a fun and quick way to learn through practical tasks.

Everything You Would Like to Know About Tunneling Connections via SSH (ebook)

The Cyber Plumbers Handbook is an essential resource for IT security professionals, offering practical advice and incident response strategies.

Anatomy of Bitcoin Price Manipulation - Analysis

The article analyzes Bitcoin price manipulation, detailing how major investors use techniques that lead to artificial price fluctuations. It also emphasizes the need for regulations in cryptocurrency trading.

A Raspberry Pi was found illegally connected to the company's infrastructure - a description of a small investigation

The article discusses Raspberry Pi as an effective networking device, highlighting its flexibility and emphasizing security recommendations.

Hackers Laws - a collection of laws and theories that may be useful for developers

Repository 'Hacker Laws' with rules for programmers and entrepreneurs.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated