Hi all, this week I was working on a cryptography project. I was a bit confused about lot of openssl command. Especially the role of encrypt vs sign. So I shared what I learn, hope it also help you. I realize that encrypting is done using public key, not private key. Super weird at first, but it makes sense. Everyone has our public key, but no one has our private key. To decrypt it, one needs the private key.
Signing, on the other hand, using private key to write message signature. People use the public key to verify that it is actually sign with the private key associate with the public key. Thefore, we can trust the message was generate by right person. Signing is like hashing where you cannot reverse it to original data. It for verification purpose only.
was created to provide a concise collection of high value information on specific application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.
Tony Hoare invented Null and call it his billion-dollar mistake.
Or, why does Ctrl+i insert a Tab in my terminal? An interesrting bit of computer history and nowsaday we take for granted with term like shell or terminal.
What is the tech stack behind CircleCI to achieve that.
This is an instruction booklet that shows you how to build a text editor in C. Step by steps you will know how to construct a basic text editor. It’s based on Kilo, a small, fun, educational-purpose text editor written by Redis creator. Though it’s in C but it’s very simple and clean. You really don’t have to know C to follow.
The limit isn’t in docker itself but in some interesting areas. Eg, default limit of network stack: conntrack table, ephemeral ports, running out of pids.
The goal here is to allow for any curious, technically-minded newcomer to make sense of all the concepts involved in creating compression quines.
A MIT course about ditributed systems will all text books, past exams, lecture video available to us. The course is teach in Go.
Youtube play list of MIT distributed system we linked to above
Collection of gadgets for developers of Kubernetes applications
Fast and powerful Git hooks manager for any type of projects.
An easy-to-use two-factor authentication app for iOS. You can replace authy, google auth with this open source 100% Swift app
Similar to Kafka but written in Go, based on NATS streaming
See how well your website performs. Then, get tips to improve your user experience
A tool for shell commands execution, visualization and alerting. Configured with a simple YAML file
Highly configurable prompt builder for Bash and ZSH written in Go
BetterDev Link
Every Monday