Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

MafiaList - click on a large company (e.g. Facebook/Google/Microsoft) and see which startups were founded by its ex-employees

Mafialist is an educational platform offering materials on algorithms and data structures, suited for users of varying skill levels.

DeployStack - what to use in your web service. What hosting? Where to buy a domain? Which CDN to choose?

Deploystack is a cloud application management platform that offers easy deployment and process automation.

More Productive Use of GIT - A Collection of Useful Tricks

The article "More Productive Git" discusses techniques that can help developers efficiently use Git. It includes tips on organizing commits, team collaboration, and leveraging visualization tools to enhance productivity with the version control system.

How to Detect Web Application Firewalls? A List of Markers to Recognize Them

Awesome-WAF is a project that collects information about web application firewalls that protect web apps from threats.

Some of us still remember the archaic browser Netscape - but what came before it? What did people use earlier?

The article discusses forgotten web browsers from the 1990s, including Viola, Lynx, and Mosaic, and their influence on web technology development.

GIT in simple words - what is a blob, commit, hash, tree, branch, tag, etc.

The article explains the basics of Git, a version control system that facilitates collaboration among developers, tracks code changes, and manages projects.

Machine Learning? What is it?

The article 'Knock, knock! Who's there? – Machine Learning' discusses the basics of machine learning, distinguishing various types and algorithm techniques. It also addresses ethical issues related to data use and analyzes future development directions of this technology. It’s an accessible introduction for both novices and more advanced readers.

CIS (Center for Internet Security) Guidelines on Securing Various Systems and Devices

CIS Benchmarks are best practice guidelines for enhancing computer security, developed by the Center for Internet Security to help organizations improve their defenses.

OWASP Guide on Security Testing for Mobile Devices

The OWASP MSTG is a project that provides resources for security audits of mobile applications. It contains documentation with best practices and a set of analysis tools. The project is open and regularly updated, making it extremely useful for testers and developers of mobile applications.

Great tool list for security people - leaked passwords, user lists, web shells

SecLists is a repository containing lists useful for security testing, including passwords, data, and vulnerability information.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated