Understanding Lua Scripts in Redis: The Ping Pong ExampleA time ago, I posted a question about Lua scripting in Redis on my LinkedIn and shared a snippet that sparked my curiosity. For those who…May 14May 14
Cyclomatic Complexity in Software Development and Its Impact on CybersecurityExploring the cyclomatic complexity in software development and its impact on cybersecurity, including its effects on code quality andFeb 15Feb 15
Enhancing SSH Server Security: Configuring OTP for SSH Accesswe’ll explore the implementation of One-Time Passwords (OTP) as an additional layer of security for your SSH server.Jun 20, 2023Jun 20, 2023
Published inBetter ProgrammingRedis vs. KeyDB — My Performance Test and ConclusionsIs KeyDB faster than Redis?Feb 6, 2023Feb 6, 2023
Wonderful Python Libraries series Nº 2 :: Python Secure Secret StorageTreat with sensitive information is a must. But every so often, it is not easy.Aug 29, 2022Aug 29, 2022
Efficient memory usage in Python with Zero-copyPython has a lot of magic with memory under the hood and, in most cases, Inefficiently.Aug 22, 2022Aug 22, 2022
Wonderful Python Libraries series Nº 1 :: Prompt ToolkitToday I start a new series of posts with my favorite Python libraries. I’ll share with you those that, I think, is most interesting.Aug 20, 20221Aug 20, 20221
Auto-generating Regular expressions from a wordlists with PythonMaking regular expressions (REGEX) is sometimes an arduous task.Aug 12, 2022Aug 12, 2022
Measuring the performance of Python chunks in different environmentsThere are many libraries for measuring the performance of Python code. These tools are called profiling tools.Aug 8, 2022Aug 8, 2022
DevSecOps series №4 — Protecting environment variables in the most well-known C.I. systemsWell-known automation systems have specific features to manage sensitive information. I’ll cover the four most common automation systemsAug 24, 2021Aug 24, 2021