Discover how to secure your Kubernetes applications using cert-manager and Let’s Encrypt. This comprehensive guide covers automated SSL certificate management, HTTPS setup, and best practices for reliable and secure deployments.
Dynamic Environment Variables in Dockerized Next.js: A Flexible Multi-Environment Solution
Learn how to manage dynamic environment variables in Dockerized Next.js applications. This flexible solution uses a custom Docker entrypoint for runtime replacement, ensuring seamless multi-environment deployments. Works for React, NuxtJS, and more!
Generate a Professional CV PDF Using Markdown and Hugo
Learn how to generate a professional CV in PDF format using Markdown and Hugo. This guide walks you through creating a streamlined workflow to manage your content effortlessly, keeping your CV and website consistent and up-to-date.
Convert JSON to POPO
Consider that you have example.json
with the following content:
{
"firstName": "Temuri",
"lastName": "Takalandze",
"active": true,
"position": {
"title": "Developer",
"department": {
"title": "IT"
}
}
}
How not to be hacked
We live in a world where almost everything is digital. To manage the digital world, we need digital accounts. It can be an online bank account, an online wallet or even a Facebook profile. When it comes to online systems, we need to pay close attention to its security and safety, but no matter how secure the system is, its weak point will always be the user.
I will teach you how not to be a weak point in global systems and how to secure your online accounts.
My programming activity in 2k19
My #programming activity in #2k19 :)
This year was the #firstyear of #contribution to #symfony.
Hello, World!
Hallo, it’s my first blog on my website :)