Newsletter #4

Hi Everyone,

Welcome to Issue #4 of the VirtuallyTD Newsletter!

Issue #4, Another week seems to have passed by in the blink of an eye. ive collected some interesting tools this week that i hope you find useful!

Issue #4, covering week 41.

News & General

Why the Serverless Revolution Has Stalled

For a few years now, serverless computing has been predicted by some to usher in a new age of computing that thrives without an operating system to execute applications. We were told this framework would solve a multitude of scalability problems. The reality hasn’t been exactly that.

CrimeOps: The Operational Art of Cyber Crime

Cybercrime rewards innovative organizations. These can innovate at the tactical level (e.g. new or updated tactics, techniques, and procedures (TTP)), the strategic level (e.g. new monetisation methods), or at the operational level—the management of resources and personnel to achieve strategic objectives. This is operational art.


Here are the 50 ideas that changed my life. These are my guiding principles and the light of my intellectual life. All of them will help you think better, and I hope they inspire curiosity.

Tools & Projects


RegEx101 is an online Regular expression testing tool which has proved to be very useful when programming.

Try Hack Me

Learning cybersecurity on TryHackMe is fun and addictive. Earn points by answering questions, taking on challenges and maintain your hacking streak through short lessons.


Block ads, trackers and malicious websites on all your devices. Get in-depth analytics about your Internet traffic. Protect your privacy and bypass censorship. Shield your kids from adult content

Guides & Tutorials

Dockerfile Security Best Practices

Container security is a broad problem space and there are many low hanging fruits one can harvest to mitigate risks. A good starting point is to follow some rules when writing Dockerfiles.

How to properly manage ssh keys for server access

Every developer needs access to some servers for example to check the application logs. Usually, this is done using public-private key encryption where each developer generates their own public-private key pair. The public keys of each developer are added to the authorized_keys file on each server they should have access to.

OCR a document, form, or invoice with Tesseract, OpenCV, and Python

In this tutorial, you will learn how to OCR a document, form, or invoice using Tesseract, OpenCV, and Python.

Management & Leadership

How to answer questions in a helpful way

Your coworker asks you a slightly unclear question. How do you answer? I think asking questions is a skill (see How to ask good questions) and that answering questions in a helpful way is also a skill! Both of them are super useful.

Succeeding in a Tech Leadership position - The first 90 days

Recently, I read a blog post titled VPE and CTO — The first 90 days. It’s a brief article in which James Turnbull shows a mind map with four areas that “every new technical leader needs to, at least, think about and explore when starting at a new organization.”

4 Steps to Create a Support Driven Company Culture

Several months ago, I shared an article about using empathy maps to design a better employee engagement experience. The article was from a WordCamp Miami session Mr. Bartender and I attended earlier this year.