Articles Feed

Allow us to introduce ourselves :)

Security Update – scp

Post Written by
Ivan Dabić

Reading time: 1 minute

OpenSSH project had been working on version OpenSSH 8.0p1 in 2019 when they published that “scp” protocol thus the “scp” command has a vulnerability with verification of the file name sent by server against the one that client actually requested. This issue was mitigated in OpenSSH 8.0p1 but, was never fully applied across the platforms.Reference: https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-March/037672.html An...

Zero bytes responses – cache or not to cache?

Post Written by
Ivan Dabić
Last modified on June 30th, 2020 at 9:01 am

Reading time: 4 minutes

Should 0 bytes responses be cached or not (on middle points like CDN or other proxies) is a problem that can be addressed by two entities: RFC Client’s request For client’s request to be met it’s assumed that #1 is honored. What RFC says for 0 bytes caching, basically, is that if a file (or...

Leading meetings that produce results

Post Written by
Ervin Duspara
Last modified on June 29th, 2020 at 1:58 pm

Reading time: 4 minutes

Leading meetings that produce results. We’ve all been there – you are stuck in an endless meeting, not really sure why you’re even there in the first place. And you’re probably not alone. When attending such meetings, I have the feeling of being in a hostage situation. Even worse, I can’t stop thinking about all...

Log checking with GREP and AWK

Post Written by
Ivan Dabić
Last modified on June 30th, 2020 at 10:42 am

Reading time: 5 minutes

Most of the time when checking logs we’re presented with a lot of data we may necessarily not need, or we have to manipulate it in some way or present it to a client in a specific way. All of that can be done using a scripting language or utilizing AWK right from the terminal...

Team Leadership as a Calling

Post Written by
Ivan Dabić
Last modified on June 25th, 2020 at 12:18 pm

Reading time: 6 minutes

Internal promotions can be hard to handle. If you’re promoted to be a team leader, there are some counter effects to the promotion, put upon you by your old team. Studies show that a good number of employees get fired or demoted within the first year of receiving a promotion to a higher position. People...

Gathering Product Development Feedback

Post Written by
Ivan Dabić
Last modified on June 25th, 2020 at 3:43 pm

Reading time: 3 minutes

In one of my previous posts, I’m describing a personal take on the product management process. Based on hands-on experience, it outlines how to guide the product management process. Of course, it is only one of the ways to follow product management, but I’ve tried to generalize it in a way that would fit most...

Customer Happiness Metrics

Post Written by
Ivan Dabić
Last modified on June 26th, 2020 at 12:02 pm

Reading time: 9 minutes

While driving your business engine to a certain direction, ask yourself if the traffic signs along the road are correct. Usually, it’s the governmental entity that put the signs into place, representing a certain rule, prohibition… But, what if YOU were able to set yourself up with custom signs, for your own needs? In real-world...

Wildcard purge nginx cache

Post Written by
Ivan Dabić
Last modified on June 30th, 2020 at 1:51 pm

Reading time: 7 minutes

Looking for a good solution, at least for my use case, I’ve stumbled upon interesting approach to find and remove nginx cached files by regex pattern. This is proxy_pass or fastcgi cached files, regardless. Repository with source code can be found on github: https://github.com/perusio/nginx-cache-purge The script gets the arguments from regular expression to calculate the match within...

A glance into the reverse proxy setup with nginx

Post Written by
Ivan Dabić
Last modified on July 1st, 2020 at 11:07 am

Reading time: 5 minutes

Reverse proxy Hey all! I wanted to give a short (really short) intro to reverse proxy and how common use case is configured with nginx as a reverse proxy. Tried to keep it short as much as possible. Difference between proxy and reverse proxy Proxy is used to route requests to a well-known endpoint even...

How to change private ssh key password

Post Written by
Ivan Dabić
Last modified on June 29th, 2020 at 3:56 pm

Reading time: 11 minutes

The goal of this article is to describe the process behind changing the passphrase used to generate ssh key pair (private and public) due to security policies or other scenarios where passphrase tends to be a liability in strictly security sense of the word. When the ssh key is generated and passphrase selected, as a...

Contact Us

Fill out the enquiry form and we'll get back to you as soon as possible.

*Max. file size 5MB


*How did you find out about us?