Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Leak of any YouTube user's email address - bug bounty for 10k USD

The article discusses the issue of leaked YouTube user data, including email addresses, emphasizing the importance of online privacy protection.

Deep Research is now available on Perplexity

The article discusses the new 'Deep Research' feature in Perplexity AI, offering advanced search and data processing capabilities.

PgAssistant - open-source tool for optimizing PostgreSQL

pgassistant is a tool for managing PostgreSQL databases, simplifying administration, monitoring, and backups.

WGER - open-source application for managing workouts and diets

Wger is an open-source project that allows users to manage workouts and diet through personalized exercise plans and healthy eating.

Scandal in the speedrunning world of Diablo - cheating uncovered through analysis of random number generator

The article details how a group of hackers debunked a speedrun record in Diablo II, emphasizing the need for transparency in this space.

New phishing attack on YouTube filmmakers

The article discusses a phishing attack on YouTube, outlining scammers' methods and the importance of user data protection.

SecTube - recordings from various cybersecurity conferences

Sectube is an interactive video platform connecting creators with audiences through various interactive features.

How does context-switching affect programmers' productivity?

The article discusses the impact of context switching on productivity, emphasizing how frequent task changes affect work efficiency. It highlights the importance of effective task management and suggests various techniques to minimize adaptation time.

How Vim Survived After the Death of Bram Moolenaar?

Interview with Tim Pope about the future of Vim and its ongoing innovations.

Build Your Own Lab for Offensive Testing - Step by Step

The article discusses offensive labs in cybersecurity that support learning and skill development in penetration testing. It provides insights into a hands-on approach to education in this field and highlights the importance of ethical hacking.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated