Hi all, this week my friend, Esther Schindler, share with me an artile when you consider becoming a software QA professional. Check it out if you consider that career path.
On the other note, if you want to getting better at hacking and security, we had a Hacker Roadmap
which is an overview of what you need to learn penetration testing and a collection of hacking tools, resources and references to practice ethical hacking. Most of the tools are UNIX compatible, free and open source.
Now, on to our normal links. As alway, please help spread the words if you like this news letter :-).
Some Useful Probability Facts for Systems Programming
Probability problems come up a lot in systems programming, and I’m using that term loosely to mean everything from operating systems programming and networking, to building large online services, to creating virtual worlds like in games. Here’s a bunch of rough-and-ready probability rules of thumb that are deeply related and have many practical applications when designing system
The Let It Crash Philosophy Outside Erlang
One of the ideas at the core of the Erlang runtime system’s design is the Let It Crash error handling philosophy.
This post presents a couple real world scripts written in various languages and then showing how they can be improved using the Let It Crash principles.
Which tables should be auto vacuumed or auto analyzed?
When using Postgres or any of software based on it, such as Redshift, you have to aware of manually vacuum when autovacuum couldn’t keep up with changes. But when doing manually, how do we check which tables are waiting for autovacuum to work on them.
an Open-Source Collection of +200 Algorithmic Cards to Help you Preparing your Algorithm & Data Structure Interview
What you probably didn’t know about sudo
Everybody knows sudo, right? This tool is installed by default on most Linux systems and is available for most BSD and commercial Unix variants. Still, after talking to hundreds of sudo users, the most common answer I received was that sudo is a tool to complicate life.
The Shapes of Code
Every piece of code we write is unique, or pretty much. However, there are things that are common in a lot of code, even across various codebases, and even across various languages: the physical shape that code has.
128 Bits of Security and 128 Bits of Security: Know the Difference
Daniel J. Bernstein’ favoured (and designed) ciphers that have 256 bits of security, and explained in painstaking details that 128-bit encryption keys may not be quite enough for all applications. On the other hand, he designed Curve25519, whose security goal is… 128 bits.
Code to read
a GNU/Linux port of the Little Snitch application firewall.
This code is useful because it use Python to implement the UI while the core logic is in Go.
📻 A SDR Based FM/AM Radio For Desktop. Accelerated with #cuSignal and Numba.
16 New ML Gems for Ruby
Rubyist know that Ruby is lag behind in ML compare with Python. But Anknane is working really hard on it. He authors many popular gems
such as ChartKick, PgHero.
Binary editor written in Go
Build and deploy Go applications on Kubernetes
A fast port scanner written in go with focus on reliability and simplicity
a fast, modern, zero-conf load balancing HTTP(S) and TCP router for deploying applications managed by consul.
Small and reliable initramfs solution supporting (remote) rescue shell, lvm, dmcrypt luks, software raid, tuxonice, uswsusp and more
A tiling window manager for macOS based on binary space partitioning
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this