cr0hnUnderstanding Lua Scripts in Redis: The Ping Pong ExampleA time ago, I posted a question about Lua scripting in Redis on my LinkedIn and shared a snippet that sparked my curiosity. For those who…·3 min read·11 hours ago----
cr0hnCyclomatic Complexity in Software Development and Its Impact on CybersecurityExploring the cyclomatic complexity in software development and its impact on cybersecurity, including its effects on code quality and·9 min read·Feb 15, 2024----
cr0hnEnhancing SSH Server Security: Configuring OTP for SSH Accesswe’ll explore the implementation of One-Time Passwords (OTP) as an additional layer of security for your SSH server.·2 min read·Jun 20, 2023----
cr0hninBetter ProgrammingRedis vs. KeyDB — My Performance Test and ConclusionsIs KeyDB faster than Redis?·4 min read·Feb 6, 2023----
cr0hnWonderful Python Libraries series Nº 2 :: Python Secure Secret StorageTreat with sensitive information is a must. But every so often, it is not easy.2 min read·Aug 29, 2022----
cr0hnEfficient memory usage in Python with Zero-copyPython has a lot of magic with memory under the hood and, in most cases, Inefficiently.1 min read·Aug 22, 2022----
cr0hnWonderful Python Libraries series Nº 1 :: Prompt ToolkitToday I start a new series of posts with my favorite Python libraries. I’ll share with you those that, I think, is most interesting.2 min read·Aug 20, 2022--1--1
cr0hnAuto-generating Regular expressions from a wordlists with PythonMaking regular expressions (REGEX) is sometimes an arduous task.1 min read·Aug 12, 2022----
cr0hnMeasuring the performance of Python chunks in different environmentsThere are many libraries for measuring the performance of Python code. These tools are called profiling tools.3 min read·Aug 8, 2022----
cr0hnDevSecOps series №4 — Protecting environment variables in the most well-known C.I. systemsWell-known automation systems have specific features to manage sensitive information. I’ll cover the four most common automation systems3 min read·Aug 24, 2021----