TL;DR Yesterday I experienced negative Black Swan event. I will described it along with explanation what is Black Swan event. This is explained in the book “The Black Swan (Taleb…
TL;DR In previous post I described how to do security hardening for your Ruby on Rails web server. In this post I will talk about other servers: database, openvpn, cache…
TL;DR In previous post I explained security hardening for linux server. This post will describe hardening based on server purpose. Modern web application typically consists from following components: web server…
TL;DR Next series of blog posts is about Ruby on Rails bottom up security. I will cover all aspects of web application written in Ruby on Rails framework. Described security…
TL;DR This post is about hands on session for learning about software testing using card games. Intro At TestBash Brighton2017, on Friday conference day, during the Lean Coffee, one lady…
TL;DR In this post I will describe how I got different test results using two testing tools Bug Magnet and Counter strings. Bug Magnet is handy Chrome Extension developed by…
TL;DR In this post I will present two examples of safety nets created by software industry professionals. Note the context, I stated software industry professionals, which includes anybody involved in software development….
TL;DR This post is about my learning experience on latest Testival meetup. We had two talks and one 5 minute talk. We started with traditional introduction of every participant. Repsly…