Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

List 5 recommended programming channels hosted by women (English-speaking)

The article features five women who stand out on YouTube in programming. They share knowledge, inspire others, and promote diversity in IT.

Terminal Tool for Downloading COVID-19 Statistics (It Even Draws Graphs!)

COVID-19 JavaScript is a tracking tool for the COVID-19 pandemic, providing data from various sources and visualizations.

Overview of 4 Methods for Searching Arrays in JavaScript

The article describes four methods for searching in JavaScript arrays: forEach, filter, find, and some. The author explains when each method is useful.

Do you need a logo of some company in SVG? You will find it here

LogoSear is an innovative logo search tool that simplifies brand identification and analysis.

How to store 'secrets' in an application? (e.g. API access keys)

The article highlights the importance of effective API management and secret protection, emphasizing key security practices.

GraphViz - learn to create graphs using code

The article describes Graphviz, a tool for creating diagrams using code. It covers installation, DOT syntax, and integration with various programming languages, allowing programmers to create effective data visualizations.

Pleasant CSS Color Name Browser - for those who don't like hex codes ;)

The 'Sorted Colors' article discusses methods for sorting colors in web development with code examples and optimization tips.

A course teaching the principles of working with and configuring Flexbox in CSS (including advanced methods)

Flexbox Froggy is an educational game that teaches CSS Flexbox through interactive frog challenges, encouraging practical skill application.

Do you like tower defense games? Then play Flexbox defence!

Flexbox Defense is a game that teaches CSS Flexbox through fun and challenges.

Methods of Evading Antivirus Software by Malware

The article discusses bypassing antivirus programs and presents concrete examples of techniques used for this purpose. It emphasizes that security software is not always sufficient, requiring continuous updates and user education. Understanding how malicious software works is essential for effectively protecting against threats.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated