2025-09-25
Introduction
In addition to “heavyweights” like SFTP, there are simpler, narrow-purpose protocols.
They aren’t meant for everyday file sharing, but are indispensable in their niches.
In this article, we’ll look at two such tools: TFTP and SCP.
TFTP (Trivial File Transfer Protocol) — maximum simplicity
As the name suggests, TFTP is a “trivial” or simplified version of FTP. Its main goal is to be as lightweight and easy to implement as possible.
2025-09-24
Introduction
After we figured out insecure FTP, it’s time to meet its secure successors.
Here’s where confusion often arises: many people think FTPS and SFTP are the same thing.
In reality, these are two completely different protocols — with different histories and principles of operation.
What is FTPS? (FTP + Security)
FTPS (FTP over SSL/TLS) is a direct evolution of classic FTP. It takes standard FTP and “wraps” its connections in the cryptographic protocol SSL/TLS (the same one that protects websites via HTTPS).
2025-09-23
Introduction
When it comes to file transfer over a network, the first thing that comes to mind is FTP (File Transfer Protocol) — one of the oldest and most fundamental internet protocols. Despite its age, it’s still in use and serves as a starting point for understanding more complex systems.
What is FTP?
FTP (File Transfer Protocol) is a protocol designed for transferring files between computers on a network. It works on the client–server model:
2025-09-20
Introduction
Business process automation has become a standard: whether it’s integrating CRM with messengers, data processing, or DevOps tasks. In this article, we’ll look at what automation tools exist, how they differ, and how to choose the right solution for your needs.
Zapier
Zapier is one of the oldest and most popular automation services (since 2011). Its strength is its huge ecosystem: more than 5000 integrations, including CRMs, messengers, marketing, and financial tools.
2025-09-12
Introduction
Modern users expect web applications to work as fast and responsive as native software. Chats, stock quotes, collaborative document editing — all these scenarios require instant data exchange. In this article, we’ll break down how Long Polling works, why it was replaced by WebSockets, and how to properly configure these technologies on popular web servers.
The Real-Time Problem and the First Solution: Long Polling
HTTP was originally designed for the request-response model: the client contacts the server, the server replies, and the connection closes. For dynamic applications, this is inconvenient.
2025-09-07
Introduction
We are used to using convenient services like Google Meet or Zoom. But what if you are a doctor, mentor, or consultant for whom privacy and full control over client data are crucial?
Let’s compare two popular tools: Jitsi Meet and Google Meet, and figure out which one is better suited for professional work.
What is Jitsi Meet?
Jitsi Meet is not just a video conferencing service but a full-fledged platform with open-source code. It can be used via the public server (meet.jit.si) or deployed on your own server for complete control.
2025-09-06
Introduction
Choosing a web server and reverse proxy today depends on tasks and infrastructure.
Caddy, Traefik, HAProxy, Nginx, and Apache are five popular solutions, each with its strengths and weaknesses.
In this article, we’ll compare them by key criteria: philosophy, installation, SSL, CI/CD, and complexity.
Comparison by Key Criteria
| Criterion | Caddy | Traefik | HAProxy | Nginx | Apache |
|---|
| Philosophy | Simplicity, automatic SSL | Dynamic routing and Service Discovery | High-performance load balancer | Universal web server and proxy | Classic web server, static approach |
| Installation | Single binary | Container, requires setup | Single binary, manual configuration | OS package, easy installation | OS package, easy installation |
| SSL Automation | Built-in, main advantage | Built-in, part of ecosystem | No (requires external integration, e.g., certbot) | Partial (via certbot or modules) | Partial (via certbot or modules) |
| CI/CD | Very easy integration | Ideal for microservices | Used for high-load balancing | Requires manual steps, integration possible | Requires manual steps, integration possible |
| Complexity | Low, beginner-friendly | Medium/high, requires orchestrator knowledge | Medium, more complex configs | Medium, rich ecosystem | Medium, often bloated configs |
| Performance | Good, but not top-tier | Good | Excellent, optimized for load balancing | Excellent | Average |
| Best Use Case | Local development, quick MVPs | Docker/Kubernetes, microservices | High-load systems, load balancing | Universal choice for web and proxy | Static site hosting, legacy systems |
Who Is It For?
🔹 Caddy
Ideal for:
2025-09-05
Introduction
Unlike Caddy, which focuses on simplicity, Traefik (pronounced Traffic) was built to solve one specific task: routing traffic in dynamic environments.
It is a reverse proxy and load balancer designed specifically for Docker, Kubernetes, and other orchestrators.
The main difference from Nginx is not static configuration, but the ability to automatically discover and serve services.
Key Concepts: Dynamic Configuration
The philosophy of Traefik is built on the principle of Service Discovery.
2025-09-04
Introduction
In a world where setting up a web server often requires studying complex configuration files, Caddy offers a radically different approach.
It is a modern, multifunctional web server, reverse proxy, and certificate authority in one package.
Caddy was created with a single goal: to provide maximum simplicity.
If you are tired of the redundancy of Nginx or Apache, then Caddy is what you’re looking for.
Its main “killer feature” is fully automatic SSL certificate management, making it an indispensable tool for developers.
2025-09-01
AWS Cognito and Microsoft Entra ID: Authentication as Part of the Ecosystem
Introduction
If Auth0 is the “hired expert” for authentication, then AWS Cognito and Microsoft Entra ID are the “system engineers” from tech giants. These services don’t just solve login — they are deeply integrated into their ecosystems and work best when you’re already using the cloud that created them.
AWS Cognito: Authentication for AWS-Native Applications
The Big Promise: AWS claims that Cognito is the “gateway” for your users into AWS. It’s designed to seamlessly integrate with other AWS services, such as Lambda for business logic or API Gateway for building APIs.