Awesome PR processes in 7 easy stepsIn this article I’ll describe some patterns I’ve noticed that help to make the pull request (PR) process smooth and productive.Nov 16Nov 16
Mobile Device Management (MDM)Mobile devices are laptops, tablets, and smarphones. The issue with mobile devices is that they get lost if you have enough…Oct 27Oct 27
Network Scanning 😈Assume you are an attacker and you are in the network you want to attack. What is your next step?Sep 14Sep 14
Why Story Points are a bad idea for measuring developer productivityPeople want to be good in their jobs and make decisions they can justify. For this reason, data-driven decisions are a wildly popular…Sep 10Sep 10
Open Source vs Free SoftwarePeople use “open source” and “free software” as synonyms but are not. All Free Software is open source, but not all open-source software is…Sep 7Sep 7
Published inFAUN — Developer Community 🐾Brute Force Attacks 😈Just try all options with an exhaustive brute-force searchAug 23Aug 23
How to test Requests in Web DevelopmentAs a backend developer, I sometimes have the need to check which requests are sent, including the headers and the payload. It’s enormously…Aug 19Aug 19
Published inPlain and SimpleWhat is a forward/reverse proxy?A proxy forwards requests. They can filter or change requests.Aug 18Aug 18