The Rietta Blog

Ruby Gems Supply Chain Vulnerability

Learn 5 practical steps to protect yourself from malicious backdoors in Ruby Gems.

The Case for 2FA, Post Rest-client Gem CVE

On 08/19/2019, a CVE was discovered on a popular Ruby gem called Rest-client. Although caught quickly, this could raise the case of 2FA being a requirement for Package Manager accounts like Rubygems and NPM.

What's the Difference Between the 3 Github Merge Methods?

Github's interface makes merging in commits versatile to suit your style of maintaining a clean Git history. The three different styles are Create Commit, Squash, and Rebase.

Best Data Type to store Money in MySQL?

Alex Piechowski

When handling currency in MySQL, use DECIMAL(13,2) for general use and DECIMAL(13,4) if GAAP Compliance is needed.

Account Protection Policies to Cover Business Assets

Utilizing two factor authentication, strong passphrases, password managers, and NIST standards; private company accounts can remain secure. Cover your assets!

Writing Abuser Stories

Lori Hamilton

When writing user stories, user stories are written; but what about malicious actors? Writing Abuser Stories pushes developers to care about security.

Manually Editing Git Hunks: The Easy Way

Git add --patch can help keep code changes relevant with their commits. When changes are unsplittable, we can use Manual-Hunk to split changes line by line.

How to hide .gitignored Files from fzf.vim

Alex Piechowski

Keep those nasty .gitignored files like node_modules/ from clogging up fzf fuzzy finder and show commited, hidden files such as .circleci/config.

Herding Cats: The Todo List

Lori Hamilton

Finding a tool to tame the chaos when you're new to an Agency setting and responsible for organizing "all the things".

How To Use Slack To Maintain A Team Reading List

Matt Bettinson

Having a clean and focused reading channel in Slack allows us a sanctioned place for in-depth discussion and news sharing.