The Consul outage that never happened
Imagine when it’s time to renew your cert and you realize the CA private key is lost. Gitlab was in a middle of an outage but not to the point of taking whole side down.
Build your own React
We are going to rewrite React from scratch. Step by step. Following the architecture from the real React code but without all the optimizations and non-essential features.
Diving into Merkle Trees
Introduced in 1979 by Ralph C. Merkle in his Thesis: Secrecy, Authentications, and Public Key Systems, the Merkle Tree, also known as a binary hash tree, is a data structure used for efficiently summarizing and verifying the integrity of large sets of data enabling users to verify the authenticity of their received responses.
Randomizing Queries to Uncover Order-Dependency
If ORDER BY is not given, the rows are returned in whatever order the system finds fastest to produce. During development, that usually the iserted order, and we only know about bug when deploying to production with enough load. To help surface these issues during development I propose exaggerating the randomness of results in queries missing an ORDER BY.
Linux Kernel Defence Map
Linux kernel security is a very complex topic. Some defence technologies are provided by the Linux kernel mainline. Others are going out‑of‑tree for various reasons (some of them are commercial, for example). Plus there are kernel defences that depend on special hardware features.
From zero to main(): Bootstrapping libc with Newlib
This is the third post in our zero to main() series, where we worked methodically to demystify what happens to firmware before the main() function is called. So far, we bootstrapped a C environment, wrote a linker script from scratch, and implemented our own bootloader.
How CockroachDB Built a Vectorized SQL Engine
Using vectorized processing in an execution engine makes more efficient use of modern CPUs by changing the data orientation (from rows to columns) to get more out of the CPU cache and deep instruction pipelines by operating on batches of data at a time.
Preloading fonts: when does it make sense?
In the past, when loading custom fonts we couldn’t really avoid the flash of unstyled text (FOUT)—you know that split second when the website is loading and it uses a substitute font until it loads your custom one?
Hacking Neural Networks: A Short Introduction
This is a short introduction on methods that use neural networks in an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.). The repo is code, full article is here
Code to read
Bash package manager
The fastest JSON Schema Validator.
Cluster Autoscaler for Kubernetes and Mesos
A Ruby job queue that uses PostgreSQL’s advisory locks for speed and reliability
Rich interactive widgets for terminal-based UIs written in Go
Yubikey at DataDog
this setup lets you store your private subkeys on your YubiKey. Actually, it gives you much stronger guarantees: you cannot authenticate over SSH and / or sign GPG commits / tags without: (1) your YubiKey plugged in and operational, (2) your YubiKey PIN, and (3) touching your YubiKey.
analyzes the content of a web page, then generates suggestions to make that page faster.
A web-based note-taking app with GitHub sync and Markdown support
a tool for matching and rewriting code. You start by writing a simple template to match syntax
The Community Distribution of Quay that powers Red Hat Quay and Quay.io
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this