You can filter posts by date, tag or even use natural language to find whatever you want
Most popular tags
Recent posts
Security of the HTTP/2 protocol - request smuggling, downgrading, and other threats
The PortSwigger article analyzes the HTTP/2 protocol, its benefits, and security threats, citing techniques used to attack web applications. It emphasizes the importance of being aware of threats and testing applications.
Interesting use cases of the href attribute in the A tag
Jim Nielsen's article discusses the various possibilities of using the href attribute in HTML, highlighting its semantics and impact on UX and SEO. The author encourages innovative thoughts on incorporating href in web projects.
Universal Chat - AI chat without logs and accounts
Ch.at is a knowledge resource for IT technologies, providing articles and tutorials.
Recommendations from CERT Polska for Creating CSIRT Teams - Cybersecurity (PDF, 71 pages)
The article discusses recommendations for CSIRT teams in Poland, emphasizing the importance of updating practices, communication, and collaboration in the face of cyber threats.
Can modern LLMs count the letters in the word "blueberry"?
The article discusses the Blueberry project, associated with language models that promise cost-effective and efficient solutions, highlighting the challenges of training and deployment.
AI does not need consciousness to destroy the middle class
The article discusses the impact of artificial intelligence on the middle class, highlighting the threat of job loss due to automation that does not require machine awareness. Adapting to new conditions is crucial for the survival of this social group.
State of CSS 2025 - survey results
The State of CSS 2025 report gathers information about CSS usage and trends in web projects, offering insights into the growing popularity and application of this technology.
ForesightJS - predicting user intent and intelligent prefetching
ForesightJS is a JS library for data analysis and forecasting.
Why XSS Still Works Despite Modern Frameworks?
The article discusses why XSS attacks persist in frameworks, pointing out implementation issues and gaps in developers' security education.
Teletext (telegazeta) in the world - a history from many countries
The article outlines key aspects of virtualization in IT environments, providing insight into its applications and technologies like VMware and Hyper-V. Virtualization enhances resource management and operational efficiency for companies.
Source of content in this blog is https://news.mrugalski.pl
All content including posts, their short version, tags and video transcriptions is 100% AI generated