PinnedCreate a cheap http-proxy on GCP with terraform ( tutorial )Sometime is very useful to have a private, high performance. This this terraform script you can easily create one ready to use. And when…Nov 11, 2021Nov 11, 2021
PinnedLog4j shell attack. Let’s analyze one attack we receivedNo one thing about security, until they get hit by a cyber attaDec 23, 2021Dec 23, 2021
PinnedGithub Copilot few thoughtsTLDR; Is better than iPhone Siri 😅, but keep reading …Dec 31, 20211Dec 31, 20211
PinnedPublished inCodeXasdf, a must-have for every programmerone runtime manager to rule them allMar 31, 20223Mar 31, 20223
PinnedCreate a VM with docker (pre-)installed using terraform.This is not the best way of doing it but is one way that I like.Nov 1, 2021Nov 1, 2021
Decoding the Loopback: 172.0.0.1 vs. 0.0.0.0 — What’s the Real Difference?Ever stumbled upon these mysterious IP addresses, 127.0.0.1 and 0.0.0.0, and wondered what digital magic they hold? They’re not your…Feb 20Feb 20
Securing Your Maven Credentials: A Guide to settings.xml and settings-security.xmlMaven’s settings.xml file is a crucial part of your development environment, holding configurations for repositories, proxies, and server…Feb 20Feb 20
How to apply the “what, how, why” for software development3 steps to achieve great quality softwareMay 23, 2024May 23, 2024
What is a docker fork bomb? 🐳⑂💣somehow this is still a thing in docker, after more than 7 yearsOct 1, 2023Oct 1, 2023