Identifying Vulnerable Dependencies In .NET Projects
How to scan NuGet packages for security vulnerabilities using GitLab CI.
How to scan NuGet packages for security vulnerabilities using GitLab CI.
How to use FFmpeg to convert FLAC files to Apple Lossless without losing the original quality and uploading them to Apple Music.
Using Github Actions and pip-tools to compile a requirements.txt file from your dependencies.
Keycloak allows configuring a custom LDAP user filter for User Federation to select a subset of user entries in Active Directory.
Over the past few years, I've been interviewing dozens of software engineers who didn't know how their developed services run in production.
You're starting a new project with Apache Kafka. Before setting up broker parameters and writing producers and consumers, what questions should you ask yourself? To ensure a smooth start, I have prepared the following checklist/questionnaire.
The story about the DNS resolver, Linux VMs, experienced infrastructure team, and me troubleshooting an incident happened on Sunday morning.
In situations where CI is not available, building multi-arch images locally can save the day.
On joining the community of one of the proof-of-stake blockchains and finding a client vulnerability in its wallet app.