Curated list of episodes, bundled to help you on your learning path!
Videos of tech, infrastructure, hardware and software which non-instructional by nature.
Articles around software and tutorials.
Show your love and support while looking fancy.
Got a question or want to chat about a topic? Let's talk!
Create dynamic roles that can be assigned to users. Based on the assigned role, the user will be able to perform or view various parts of the application.
Part I - In this episode, we create our authentication for users, default view for authenticated users, friendship model, associations and scopes for our social media application.
Using the gdpr_rails gem, we look at adding a policy manager to require users to accept age, terms, and privacy policies before signing up for an account.
Keeping client data protected is important, but once an attribute is encrypted, it becomes difficult to work with it. With Blind Index, we regain functionality on searching and validations.
In this episode, we look adding in some of the requirements of the General Data Protection Regulation into our Ruby on Rails application. Disclaimer: this episode is not legal advice and you should consult a lawyer.
Cross-Origin Resource Sharing (CORS) is a mechanism that uses additional HTTP headers to tell browsers to give a web application running at one origin, access to selected resources from a different origin.
We may come across a need to run shell commands and Ruby has some built in methods which appear safe, but can introduce major security risks.
Cloudflare Turnstile delivers frustration-free, CAPTCHA-free web experiences to website visitors. In this episode, we'll look at implementing this a few different ways and resolving some issues with Turbo.
Using a hardware security key for multi-factor authentication is a great way to protect user accounts. In this episode, we look at implementing security keys into our Ruby on Rails applications with Devise user accounts.
In this episode, we look to add on some features to Device with tracking devices that a user has authenticated with and then remote deleting sessions.