Erkki Muuga
20 posts
The Hunter Behind the Hacker
0x01. Executive Summary During cyberattacks, adversaries often rely on Command-and-Control (C2) servers, loader servers, or even their own…
IGN: Darkest Dungeon 2: Kingdoms – Official Curse of the Court Trailer
Darkest Dungeon 2: Kingdoms – Curse of the Court sinks its teeth into your campaign with a vampiric…
CNCF [Cloud Native Computing Foundation]: ChatLoopBackOff: Episode 68 (KANISTER)
In this live stream, CNCF Ambassador Carlos Santana is taking a first-look at Kanister, an open-source framework for…
A small guide how to start AWS Community Day from scratch
AWS Community Day is a one day, community led conference, totally organized by AWS community. It is a…
Project Planning Phase: Key Activities and Outcomes
The project planning phase is a crucial stage in the project management lifecycle where the foundation for successful…
Just asking to know!
What happened to flutter fork ‘flock’, not getting any update anymore. (I am beginner and heard about flock…
📦WebSocket Broadcasting with hyperlane
WebSocket Broadcasting with hyperlane The hyperlane framework natively supports the WebSocket protocol. Developers can handle WebSocket requests through…
What is a Queue?
This is a submission for DEV Computer Science Challenge v24.06.12: One Byte Explainer. Explainer When you visit a…
Lessons from Open-Source Game Projects
Tutorials are an excellent way to learn the basics of game development and become familiar with your chosen…