Hi all, this week I want to share this cool book: https://sql-performance-explained.com/.
You can use discount code CyberMon19
to get the PDF for free. The author has temporarily made his fabulous SQL performance book
available for free for a few days.
Now to our links. If you like this newsletter, please forward it to your friends :-).
Instead of using normal debugging tools like gdb, I have another toolset for debugging deployments. My favourite tool for “Why isn’t this software working on this machine?” is strace
Troubleshooting an issue where the server replies with an ACK only instead of SYN/ACK. Also some simple Wireshark tips.
In order to appreciate the impact of using UUID values as a primary key, it is important to review how InnoDB organizes the data. InnoDB stores the rows of a table in the b-tree of the primary key. In database terminology, we call this a clustered index. The clustered index orders the rows automatically by the primary key.
Beside issue free cert, LE runs a Certificate Transparency. They issue 1M certs per day and share how they run this log infrastructure to handle that scale.
You’re making morning drip coffee. You need to make 2 cups. Do you: 1. Put 1 cups worth of water in the boiler so the water boils sooner and the first cup is ready sooner or, 2. Put 2 cups worth of water in so both cups are done sooner? This is an illustration of Latency/Throughput.
The full source also available at Github. If you don’t like book, then ReversingHero is another great option where lean toward hands-on experience, with a single binary and 15 level of increasing difficulty, teaching reverse engineering
This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today. (See Section A.4 for some additional commentary on this…)
Do you know that everything in WebGL is composed by triangles?
A freshly created socket isn’t very useful. We have to tell it to either listen for incoming data, or connect to a remote peer. To achieve anything useful we need to perform a syscall dance, which involves either bind() or connect() or both.
Mergeable Replicated Data Types (MRDTs) are in the same spirit as CRDTs but with the very interesting property that they compose. Furthermore, a principled approach for deriving MRDTs is provided, allowing a wide range of data-types to be lifted to their mergeable, replicated counterparts with very little effort on the part of the programmer.
A resilience and transient-fault-handling library that allows developers to express policies such as Backoff, Retry, Circuit Breaker, Timeout, Bulkhead Isolation, and Fallback
TypeScripta lightweight network vulnerability scanner. With Flan Scan you can easily find open ports on your network, identify services and their version, and get a list of relevant CVEs affecting your network.
A scalable overlay networking tool with a focus on performance, simplicity and security
monitors Kubernetes, recording histories of events and resource state changes and providing visualizations to aid in debugging past event
a data loading tool for PostgreSQL, using the COPY command.
an open source privacy-friendly analytics software. It aims to be reliable, friendly to use and easy to deploy.
a scalable real-time operating system (RTOS) supporting multiple hardware architectures, optimized for resource constrained devices, and built with safety and security in mind.
Open-source end-to-end encrypted password manager. Browswer extension, Go backend, Front-end in Vue are on https://github.com/keydotcat.
Network, Service & Security Observability for Kubernetes
BetterDev Link
Every Monday