Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Creating illustrations composed of a single DIV + CSS

The article 'Fall in Love with Single Div Images' discusses using single divs to manage images, simplifying styling and responsiveness. The author encourages using CSS and JavaScript to enhance site aesthetics.

How to securely transmit a password in a web application, even in the absence of SSL?

The article addresses login risks for Steam and security techniques. It emphasizes two-factor authentication and online caution.

Temporary SMS numbers, controlled from the terminal (CLI) and completely free

TMPSMS is a project that allows receiving SMS on temporary numbers. It is written in Python using Flask.

Turn your Raspberry Pi into a music hub - completely for free

Volumio is an operating system for music playback that turns computers and Raspberry Pi into high-quality audio players.

Deskreen - an application that turns any device (phone, tablet, etc.) into your second monitor

Deskreen is a tool that transforms devices into remote displays, allowing for easy image streaming from a computer to mobile devices. It supports various platforms and offers extensive customization options. Ideal for remote workers or those needing extra workspace.

Traffic movement simulator, taking into account various parameters, road signs, signals, etc.

The site https://traffic-simulation.de provides information on traffic simulation, aiding in the optimization of transportation systems.

COMPETITION: Write an article about electronics, share your knowledge and win 2000 PLN

The article discusses online security principles, including strong passwords and two-factor authentication.

Methods to Bypass Internet Censorship, or How to Access Blocked Websites

The article describes I2P, Tor, Freenet, and Zeronet as tools for accessing anonymous and free internet. It emphasizes the importance of privacy and fighting censorship.

Beware if you want to 'leak' a Zoom meeting/training - security methods

The article on The Intercept addresses leaks from private Zoom meetings, highlighting how unauthorized users can expose sensitive information. It emphasizes the necessity for improved education on remote technology security.

How to manage continuous client-server communication in a trivial way, but without websockets?

Julia Evans discusses the advantages and challenges of using Server-Sent Events in her article "Day 36 - Server-Sent Events Are Cool - and a Fun Bug." She shares her experiences and tips, making it a useful read for developers.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated