Hi all, this week my friend, Esther Schindler, share with me an artile when you consider becoming a software QA professional. Check it out if you consider that career path.
On the other note, if you want to getting better at hacking and security, we had a Hacker Roadmap which is an overview of what you need to learn penetration testing and a collection of hacking tools, resources and references to practice ethical hacking. Most of the tools are UNIX compatible, free and open source.
Now, on to our normal links. As alway, please help spread the words if you like this news letter :-).
Probability problems come up a lot in systems programming, and I’m using that term loosely to mean everything from operating systems programming and networking, to building large online services, to creating virtual worlds like in games. Here’s a bunch of rough-and-ready probability rules of thumb that are deeply related and have many practical applications when designing system
One of the ideas at the core of the Erlang runtime system’s design is the Let It Crash error handling philosophy. This post presents a couple real world scripts written in various languages and then showing how they can be improved using the Let It Crash principles.
PDF of a talk at FOSDEM 2020 about Kubernetes attack vectors. Show a few specific exploits, tooling and remediation.
When using Postgres or any of software based on it, such as Redshift, you have to aware of manually vacuum when autovacuum couldn’t keep up with changes. But when doing manually, how do we check which tables are waiting for autovacuum to work on them.
We linked to this site before for their reconstruction of Capital One SSRF. They will guide you through exactly what happen so you can learn to avoid these mistake
an Open-Source Collection of +200 Algorithmic Cards to Help you Preparing your Algorithm & Data Structure Interview
Everybody knows sudo, right? This tool is installed by default on most Linux systems and is available for most BSD and commercial Unix variants. Still, after talking to hundreds of sudo users, the most common answer I received was that sudo is a tool to complicate life.
Give you an overview of how to design the system of millions of users, billions of clicks per month. From thinking to problem solving.
Every piece of code we write is unique, or pretty much. However, there are things that are common in a lot of code, even across various codebases, and even across various languages: the physical shape that code has.
Daniel J. Bernstein’ favoured (and designed) ciphers that have 256 bits of security, and explained in painstaking details that 128-bit encryption keys may not be quite enough for all applications. On the other hand, he designed Curve25519, whose security goal is… 128 bits.
a GNU/Linux port of the Little Snitch application firewall. This code is useful because it use Python to implement the UI while the core logic is in Go.
PythonGoRubyist know that Ruby is lag behind in ML compare with Python. But Anknane is working really hard on it. He authors many popular gems such as ChartKick, PgHero.
RubyAnders Hejlsberg design Turbo Pascal, Delphi and eventually C# and nowsaday TypeScript.
Build and deploy Go applications on Kubernetes
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A fast port scanner written in go with focus on reliability and simplicity
a fast, modern, zero-conf load balancing HTTP(S) and TCP router for deploying applications managed by consul.
Advanced scheduling for PostgreSQL
Small and reliable initramfs solution supporting (remote) rescue shell, lvm, dmcrypt luks, software raid, tuxonice, uswsusp and more
A tiling window manager for macOS based on binary space partitioning
The tool allows administrators of EC2 instances to lock down which data from the Instance Metadata Service can be accessed by specified system users and groups, instead of a all-or-nothing if we used a firewall. Checkout github repository for the tool itself.
BetterDev Link
Every Monday