You can filter posts by date, tag or even use natural language to find whatever you want
Most popular tags
Recent posts
Basics of AWK Necessary for Text Processing
The article discusses advanced usage of sed and awk tools, crucial for penetration testers. It includes practical examples and data manipulation techniques, simplifying the analysis of data sets.
BRIAR - communicator for tough times, including those without the internet.
Briar is a peer-to-peer messaging app designed for secure communication offline. With end-to-end encryption and an intuitive interface, users can communicate safely under challenging conditions. It serves activists and users in areas prone to censorship, becoming a tool for protecting privacy and free speech.
Are you using Kaspersky's password manager? Well, you have quite a problem...
Kaspersky Password Manager is a secure password management tool that offers automatic form filling, strong password generation, and data synchronization across devices. With stringent encryption standards, users can be confident that their data is well-protected. Its user-friendly interface and ease of use make it an ideal solution for anyone wishing to enhance their online security.
Do you use JWT tokens to keep the logged-in user's session? - that's not the best idea
The article warns against using JWTs for user session management, highlighting potential risks and suggesting better security methods.
What is Web Cache Poisoning Attack?
The article explores web cache poisoning techniques, illustrating their impact on user data security and application integrity.
Library for Email Verification - Checks SIGNIFICANTLY more than just the validity of the address
The "Check if Email Exists" project is an open-source JavaScript tool for verifying email addresses. With straightforward documentation and code examples, it simplifies integration into web projects. The tool is useful for eliminating false addresses and building a better user database.
Set of Tools (CLI) Enhancing the Work of Every Linux/Unix Admin
Sysadmin-util is a collection of tools and scripts for system administrators, simplifying management and automation tasks.
How safe is the new version of ProtonMail? - Pen testers checked it. See the report.
ProtonMail published the results of a security audit, emphasizing the effectiveness of their privacy protection system. The audit team analyzed the code and infrastructure, and any discovered problems were promptly resolved, showcasing ProtonMail's dedication to user security.
Where has Jack Ma - the founder of Alibaba Group - gone?
The article discusses Jack Ma's disappearance and the tension between him and the Chinese government, impacting the tech market.
JavaScript is weird... very weird - don't believe it? take a quiz ;)
JSIsWeird is a site about strange JavaScript behaviors and best programming practices.
Source of content in this blog is https://news.mrugalski.pl
All content including posts, their short version, tags and video transcriptions is 100% AI generated