-
This document provides a list of security measures to be implemented when developing a Ruby on Rails application. It is designed to serve as a quick re.
Read more -
Memory spikes way up. The dark purple at the bottom indicates that we are now swapping significantly. The dotted line is our memory limit, which you ca.
Read more -
The main objective of this kind of distributed denial of service (DDoS) attack, commonly called an HTTP flood, is to overburden system resources and ma.
Read more -
A session secret is a key used for encrypting cookies. Application developers often set it to a weak key during development, and don't fix it during pr.
Read more -
A quick note on Puma: by default it will spawn threads on demand in a single Ruby process with a single GIL, up to a maximum of 16 or whatever you spec.
Read more