Hi all, we have lots of goodies for you in this issue. It’ll be a busy week to learn all these new things! It’s always a good thing to learn something new and expand your skills. Enjoy!
Reverse engineering is fun. But tutorial are usually just used as a basic building block. This is a great reverse engineering workshop on a real malware. You will also learn to setup a workflow for malware analysis.
As developers, we build side project all the time, but how do we market it to the world? Bookmark this handy check list.
Struggling to keep up with the tsunami of tech news? Need to improve your signal to noise ratio? One email a day, five must-read tech news stories, sent just in time for your commute home. Stay in the loop without burning all your free time.Read the first two weeks for free
Developing secure, robust web applications in the cloud is hard… very hard. This is a simple check list with some starting points to secure your application better.
What if I told you every server is vulnerable? The problem lays in the foundation layer of almost every language: Hash table, hash map, dictionary or anything similar that allow O(1) access set of data with a key.
Normal points out two mental model for product design: the user mental model, and the product designers’ metal model. The goal of the product designer is to provider an accurate metal model. Same thing apply to API design. We go through Swift APIs to see differences between the two models
Text is the building block of content. To create effective UI and clear UX, learning the basics of typography is necessary.
Linux load averages track not just runnable tasks, but also tasks in the uninterruptible sleep state. But why? Let’s solve this mystery and summarize load averages.
Not closing resources after use is a great way to accumulate leaking due to resources being retained in memory. Always closing is better than relying on automatically closes by timeout. This post dives deep into how the ‘Square’ team figured out resource leaks use various tools and debug techniques.
Semantic errors are especially insidious because they can remain undetected for months until people happen to look in the right places. The post covers two major semantic errors: JOIN duplications and JOIN misses.
Compression is everywhere. But what really happens when you make something smaller than it is? Will the compression algorithm go wrong and make item bigger than it is? Let’s get to work.
A project to store 832TB of data cheaply with ZFS: from choosing file systems to building out our server.
Git is very easy to get started with. But it gets in your way in complex situations. In this post, we look at Git via it’s graph data structure and build our mental model on truths rather than hypotheses constructed from evidence gathered while experimenting with the API.
Service Workers is a script browser runs in background separate from a web page. It opens the doors to some nice feature such as: offline availability, enhanced performance, and push notifications. Let’s see what they can do and how to implement them.
Machine Learning is effectively software that works like our brain. In this post, we take a top-down approach attempting to make it crystal clear. What it i, and what it can be used for in the real world.
Rails developers use CSRF all the time. Let’s deep dive into the Rails codebase to understand how the feature has been implemented.
A crash course of how we measure memory impact in Ruby app.
A story of migrating a production ‘upload and retrieve’ document system from Ruby (paperclip) to Elixir. A two part series. An interesting point is retrieving the file right after uploading directly from memory without hitting S3.
A simple project to learn a bit of web speech API. It’s fun to play around with voice on your computer.
Some simple steps you can take to enhance security of authentication system.
This is code powers ifconfig.co.
It’s similar to Apache Bench or wrk. Its code base is also small enough to read and see how to write these kind of tools.
You can think of Up as a self-hosted Heroku-style user experience for a fraction of the price, with the security, flexibility, and scalability of AWS.
A server-less framework for Docker & Kubernetes.
Nmap is a powerful tool with so many parameters. Let’s level up our Nmap skills with this cheat sheet.
Machine learning-driven web application firewall to detect malicious queries with high accuracy.
Minikube is a tool to spin up a local, single-node kubernetes cluster. kube-spawn do the same thing, but support multi-node and bring the production experience closer to local development.
Better Dev Link