Linux & Desktop – how to live and survive
Many people, when they hear that someone is using Linux as a workstation, ask themselves why and how we do it. If there are many very different options for the first question, then the experience with the second one is quite similar for generalization. How…
Top 8 announcements from Microsoft Inspire 2021
“Microsoft is deeply committed to providing partners around the world with the most innovative technologies, tools and solutions in the industry,” Nick Parker, corporate vice president of global partnerships for Microsoft, said in a blog post. “We are constantly striving to drive business growth and…
KRACK Attack Author Reveals 12 Critical Vulnerabilities Of Popular Wireless Devices
KRACK (Key Reinstallation Attacks) attacks were reported several years ago. The so-called tools that allow you to exploit critical vulnerabilities in the WPA2 protocol, which are considered quite reliable. KRACK allows you to bypass security and listen to traffic in a wireless network at the…
Writing a Basic GitHub Action in TypeScript
This article is primarily intended for beginners, those who have never used GitHub Actions but would like to get started quickly. Nevertheless, even if you already have a similar experience, but you, for example, have not used ncc, then perhaps you will find something useful…
C# vs Kotlin
When it comes to sugar and fancy features in programming languages, C# and Kotlin are among the first options in mind. Since these two languages occupy similar niches, that is, they are strongly typed, garbage collected, cross-platform, used both in the backend and in mobile…
Java process memory management diagrams
There are a huge number of articles and diagrams on this topic on the Internet, however, in my opinion, none of them allows you to form a general idea of the memory use in the Java process. And without a general understanding, it is difficult…
Layer 7 DDoS attacks – protecting sites
Layer 7 DDoS attacks (application layer) are the easiest way to disable a website and harm your business. Unlike attacks at other tiers, where a powerful stream of network traffic must be set up to fail a site, attacks at tier 7 can proceed without…
Core Data + Repository pattern. Implementation details
The main idea of the repository is to abstract from data sources, hide implementation details, because, from the point of view of data access, this very implementation does not matter. Providing access to the main operations on data: save, load or delete is the main…
Service
Categories
- DEVELOPMENT (123)
- DEVOPS (54)
- FRAMEWORKS (46)
- IT (25)
- QA (14)
- SECURITY (15)
- SOFTWARE (13)
- UI/UX (6)
- Uncategorized (8)