12 Articles

A Night of DevOps and Art: Merging Two Worlds

When we think of DevOps, art may not be the first thing that comes to mind. Yet, on a recent evening, we celebrated a unique fusion of the two, showcasing that at the heart of every innovation - whether it's in the tech industry or the art world - lies creativity, collaboration, and a spirit of continuous improvement.

How your file uploads may get hacked?

Covering the most important file input validation techniques on the web, some attacks againts them, and highlight the importance of sanitizing data sent by the end user with a case study.

Log4j2 RCE and exploitation example (CVE-2021-44228)

Why this new Log4j vulnerability is so dangerous? Hacked step by step until remote shell.

How to have an effective 1on1, and why is it important?

What is an 1on1 meeting good for, and how to make it really great, where you can connect to your team member in many ways?

How can feature flagging help during release and customer experiments?

Covering a couple benefits of using feature flags in development from business and technical point of view as well.

JBoss CXF problem with IIS SSL

Fairy techtale from bank operation point of view, where governmental organization is unavailable, they failed changing api, and still able to charge horrible fee.

Notifications to Polar V800 watch

Good stuff coming for my sports tracking gadget.

Lottery code

Simplest lottery code, randomish 5 from 90 numbers.

Modifying a link after clicking

After clicking on something, it becomes something else. Schrรถdinger is awake.

Commonly used SQL injection attack strings

Collected my ~30 most used SQL injection query formats.

Public domain resolves to

Very little, but useful trick to avoid hostfile editing all the time.

GIRO account numbers and related error detection

How does it work? Is it possible to transfer money, where we don't want to, bcause of a mistake or typo?