You can filter posts by date, tag or even use natural language to find whatever you want
Most popular tags
Recent posts
List of films on the theme of 'hacker' or cyberpunk
Hacker Movie Club is a platform for fans of hacker and cybersecurity films, focusing on building a community of movie enthusiasts.
YouTube Regrets - Mozilla's report on the harmfulness of the recommendation system used by YouTube
The 'Regrets Reporter' campaign by Mozilla analyzes how online decisions impact people's emotions. The report emphasizes the need for better understanding of technology-related experiences and promotes actions that can alleviate feelings of regret regarding online choices.
GTP-J - an open-source alternative to GTP-3?
P3R discusses the GPT-J project, an open-source language model that enables text generation. Its transformer-based architecture allows efficient processing of longer texts. With open-source access, the community can adapt it to their needs.
Basics of AWK Necessary for Text Processing
The article discusses advanced usage of sed and awk tools, crucial for penetration testers. It includes practical examples and data manipulation techniques, simplifying the analysis of data sets.
BRIAR - communicator for tough times, including those without the internet.
Briar is a peer-to-peer messaging app designed for secure communication offline. With end-to-end encryption and an intuitive interface, users can communicate safely under challenging conditions. It serves activists and users in areas prone to censorship, becoming a tool for protecting privacy and free speech.
Are you using Kaspersky's password manager? Well, you have quite a problem...
Kaspersky Password Manager is a secure password management tool that offers automatic form filling, strong password generation, and data synchronization across devices. With stringent encryption standards, users can be confident that their data is well-protected. Its user-friendly interface and ease of use make it an ideal solution for anyone wishing to enhance their online security.
Do you use JWT tokens to keep the logged-in user's session? - that's not the best idea
The article warns against using JWTs for user session management, highlighting potential risks and suggesting better security methods.
What is Web Cache Poisoning Attack?
The article explores web cache poisoning techniques, illustrating their impact on user data security and application integrity.
Library for Email Verification - Checks SIGNIFICANTLY more than just the validity of the address
The "Check if Email Exists" project is an open-source JavaScript tool for verifying email addresses. With straightforward documentation and code examples, it simplifies integration into web projects. The tool is useful for eliminating false addresses and building a better user database.
Set of Tools (CLI) Enhancing the Work of Every Linux/Unix Admin
Sysadmin-util is a collection of tools and scripts for system administrators, simplifying management and automation tasks.
Source of content in this blog is https://news.mrugalski.pl
All content including posts, their short version, tags and video transcriptions is 100% AI generated