Victoria Drake
Digital resilience: redundancy for websites and communicationsHow you can make your digital life more resilient when using services you don't own.
privacy
☕️
5 min read
Victoria Drake
Add search to Hugo static sites with LunrMake your static site searchable with a client-side search index.
websites
☕️ ☕️
7 min read
Victoria Drake
What is TCP/IP? Layers and protocols explainedAlternatively titled, "Why the Internet Protocol Suite is an imaginary rainbow layer cake"
computing
☕️
5 min read
Victoria Drake
Build your own serverless subscriber list with Go and AWSHow to build your own newsletter list with DynamoDB and SES email sign up confirmations.
api
☕️ ☕️
7 min read
Victoria Drake
Three rules for choosing a VPN that takes your privacy seriouslyThe lesser-known risks of ISPs and why I chose ExpressVPN.
privacy
☕️ ☕️
6 min read
Victoria Drake
Manipulating data with Django migrationsHow to update Django models and manipulate existing data using migrations.
coding
☕️
5 min read
Victoria Drake
Outsourcing security with 1Password, Authy, and Privacy.comTake some work off your plate while beefing up security with three changes you can make today.
cybersecurity
☕️
5 min read
Victoria Drake
SQLite in production with WAL 🔥An underappreciated candidate for light and fast database transactions.
data
☕️
4 min read
Victoria Drake
Multithreaded Python: slithering through an I/O bottleneckHow taking advantage of parallelism in Python can make your software orders of magnitude faster.
python
☕️
5 min read
Victoria Drake
A cron job that could save you from a ransomware attackHow a simple scheduled job can help you quickly recover from ransomware.
cybersecurity
☕️ ☕️
7 min read
Victoria Drake
Publishing GitHub event data with GitHub Actions and PagesA guide to overcoming the GitHub event data horizon with a little command-line magic.
data
☕️ ☕️
8 min read
Victoria Drake
Secure application architecture basics: separation, configuration, and accessA starting point for building secure application architecture, for busy developers.
cybersecurity
☕️ ☕️
8 min read
Victoria Drake
Migrating to the cloud but without screwing it up, or how to move houseA practical guide to moving to cloud services with minimal downtime, using AWS examples.
aws
☕️ ☕️
11 min read
Victoria Drake
Hackers are Googling your plain text passwords: preventing sensitive data exposureWhy sensitive data controls need to be established long before you think you need them, as demonstrated by Google dorking.
cybersecurity
☕️ ☕️
8 min read
Victoria Drake
SQL injection and XSS: what white hat hackers know about trusting user inputA primer on SQL injection and cross site scripting, and how to handle user input in software development.
cybersecurity
☕️ ☕️
11 min read
Victoria Drake
How to write Bash one-liners for cloning and managing GitHub and GitLab repositoriesUsing xargs and awk in Bash to automate managing remote-hosted repositories.
terminal
☕️ ☕️
8 min read
Victoria Drake
Knapsack problem algorithms for my real-life carry-on knapsackUsing a greedy algorithm and dynamic programming to pack my full-time nomad travel bag.
algorithms
☕️ ☕️ ☕️ ☕️
23 min read
Victoria Drake
Things you need to know about becoming a Data ScientistFive Data Scientists discuss a day in the life and what it takes to be a successful Data Scientist.
data
☕️ ☕️
8 min read