Non member link.
Blog Archive
Technical articles and writeups on DNS security, Kubernetes, Golang, GPU computing, and more. All posts published on Medium.
Non member link.
Non-member link.
Non-member link.
Non-member link.
Non member link.
Non member link.
I haven’t created a formal benchmark yet. In quick trials, normal pages handled compression well, but heavily formatted tables were more sensitive they usually needed either a higher image_size or cro
You know that feeling when a “simple OCR” job quietly turns into a week of hacks tables misread, headings mangled, everything off by a few pixels? Same. DeepSeek-OCR lands like a breath of fresh air b
You know that unsettling moment when you realize something hiding in plain sight? That’s what’s happening now in the world of AI safety there’s a new jailbreak technique that’s invisible to us, but to
AI/ML/LLM/DL stacks explode local storage model weights, CUDA/cuDNN builds, toolchains, and fat Docker images. Rebuilding later isn’t guaranteed (versions drift; CDNs/registries can be geo-blocked).
This is a field guide to Colab that puts all the moving pieces in order: what a “runtime” really is, how long it stays alive, Compute Units (CUs), what persists and what doesn’t, how to choose CPU/GPU
Let us create a robust, logging, HTTPS-enabled server in Go without external configuration files.
Non member link.
The cybersecurity landscape has dramatically evolved with ransomware becoming one of its most alarming threats. Meanwhile, artificial intelligence (AI) — once merely science fiction — is transforming
Ransomware is malicious software that encrypts your files and demands payment for the decryption key. Whether you can recover your data depends on having backups, available decryptors, or professional
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
How Karpathy’s Vision Is Redefining Tech Roles, Skills & Career Paths
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Microsoft’s decision to port the TypeScript compiler from TypeScript/JavaScript to Go has generated significant interest, primarily due to the promise of substantial performance improvements. This art
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link.
Non member link
Non member link.
Non member link.
Non member link.
With the rise of open-source Large Language Models (LLMs), you no longer need expensive cloud GPUs to run AI-powered chatbots, code assistants, or security research tools. Instead, you can run LLMs di
Non member link
Non members link
Hey there, fellow developers and tech enthusiasts! If you’re feeling stuck in your current job — maybe writing “standard” web apps or maintaining old-school services — and you’re itching to learn some
Hey everyone. Another year has come and gone, and I’m back to share my thoughts on what the future might look like in 2025. It’s been a wild ride so far — some predictions never came true, while other
Non members link
Non members link
Non members click here.
Non members click here.
Wi-Fi networks are ubiquitous, providing wireless connectivity to our devices almost everywhere we go. However, understanding how these networks operate and securing them against potential vulnerabili
This is a free friend link: click here
There are three types of multi-container pods:
RBAC can help in placing various restrictions like- can list pods/deployments/services- can create pods/deployments/services- can delete pods/deployments/services- can create pods within a namespace-
In Kubernetes, the terms API and APIs can have distinct meanings depending on the context in which they are used:
Answer: The path of kube-config file is /root/.kube/config
Question: The application stores logs at location /log/app.log. View the logs.
Non members click here.
Building robust and secure APIs requires proper input validation to ensure that the data your API receives is well-formed and meets your application’s requirements. In this post, we’ll explore how to
Kubernetes Services enable communication between various components within and outside of the application. It helps us connect applications together with other applications or users.
Non members click here.
Problem Statement: In our hyper-connected digital world, understanding the speed of our internet connection in real time is more than a convenience — it’s a necessity. Despite this, most operating sys
You can create a virtual environment for your Python projects and install Jupyter Notebook within that environment. Here’s how:
By default kubernetes restarts the pod forever.
Non member link.
There are basic two types of deployment strategy
Non members click here.
Non member link.
Non member link.
Non member link.
The communication between two Goroutines needs channels. The data is transferred through piplines in form of channels which connects with different Goroutines. By default the communication among chann
Let us create a bash file which contains the bash commands line by line. Save it in the path /home/user/ssh_setup.sh
There are various ways to delete data from Linode object storage. One is using bash script other way is using python api under library boto3.
Non members click here.
Non member link.
Kubernetes helps to get the logs of the container running inside the pod by using -f option to get the particular live logs. These logs are specific to the container running inside the pod.
There are three different status a pod can be in
Rust is a low latency code developer’s first choice
Exit current mode: esc esc
Non member link.
Quantum physics can be used for cryptography. The encryption algorithms like RSA can be broken by quantum computers. But quantum cryptographic protocols remain secure against all known attacks. Crypto
The main concepts of Quantum Physics required for Quantum Computing are:
Node affinity is a property of Pods that attracts them to a set of nodes.
How to get service account details?
The status OOMKilled indicates that it is failing because the pod ran out of memory.
How to check the user in a running pod(say “ubuntu-sleeper”)?
1) Create a new secret named db-secret with the data given below.
1) Create a new ConfigMap for the webapp-color POD. Use the spec given below.
Create a pod with the ubuntu image to run a container to sleep for 5000 seconds. Modify the file ubuntu-sleeper-2.yaml.
Non members click here.
Controllers are brain behind k8s, they are used to monitor k8s objects and respond. Replication Controller is one such example. It helps run multiple instances of single pod in k8s cloud. Also it is u
Run below command in terminal 1
Non members click here.
Non members click here.
Working on remote servers using SSH is a common practice in the software development world. However, a persistent issue faced by many is the session timeout, which requires users to frequently log in
Non members click here.
Github uses ssh to connect to its server. So it depend on the ssh keys added in the current terminal session you are using. Suppose you have your personal github account(say personal-git) with its ssh
Non members click here.
Non members click here.
No articles found
Try adjusting your search or filters