Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Meet the founder of Malwarebytes - one of the most popular antivirus solutions (the guest is Polish)

The article highlights the rise of card payments in the UK and the decline of cash usage, especially accelerated by the pandemic. It showcases changing consumer preferences and growing trust in cashless transactions.

Discussion of HTTP Headers Related to Web Security

The article outlines a guide to HTTP security headers, highlighting their importance, types, and practical application to enhance website security.

How to Properly Design a RESTful API? - A Guide

The article discusses the fundamental principles of RESTful API design, including statelessness, resources, and HTTP methods. It emphasizes security importance and continuous skills development in this area.

SmashTest - a language that allows quick writing of tests (both unit and UI)

Smashtest is a test automation platform optimized for developers and QA teams.

Does the Raspberry Pi 4 need active cooling? Even under light load, the little raspberry heats up quite a bit.

The article discusses the need for a fan for the Raspberry Pi 4 and how to install one.

Cheat Sheet for Array Operations in JavaScript

The article discusses basic array operations like adding, removing, and filtering. It includes practical examples and common mistakes.

Do you care about privacy? Disable WebRTC in your browser

The Sekurak article discusses the risks associated with WebRTC and recommends disabling this feature in browsers to protect user privacy. WebRTC may expose IP addresses, posing a risk to anonymity. The author presents methods for adjusting browser settings to enhance privacy and emphasizes the importance of making informed choices about online tools.

Who is really behind VPN services? 97 VPNs are managed by 23 companies

The article reveals that 97 VPNs are actually owned by 23 companies, undermining trust in these services. Users need to be aware of who owns their privacy protection providers.

A security engineer working for Oracle shares his methods for data encryption

Robert Clarke discusses the significance of cloud encryption for data security. Encryption transforms information into unreadable text, allowing only authorized individuals to access it. He points out that it does not eliminate the risk of data theft but significantly reduces it while providing an additional layer of protection.

How does GitHub know what programming language a given project is written in?

The GitHub article analyzes programming languages like C, Java, TypeScript, and JavaScript using machine learning. It focuses on the classification factors and their popularity.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated