Hi everyone, ! 👋
Welcome to issue #138. Big week for security, Cisco and Sudo boths has Vulnerabilities.
If you has been playing around with Lambda and still not sure how the world view it, then this blog post from datadog will convince you. Basically half of of AWS users have adopted Lambda.
Now to our normal links. If you have developer friends, please share this newsletter with them :-). Thank you.
Linux Kernel Tuning for High Performance Networking Series. On this same series, you should also check out TCP/IP Connection Primer
When you use a Mac or Printer, you may notice host name like Joe's Mackbook.local
or Printer.local
. That makes possible by mDNS. This article focus on security aspect of mDNS and what we should look into when doing accessments.
Impacting Tens of Millions of Devices. The technical whitepapers are 29 pages long has all detail and code(by decompile code). Reading these white papers are definetely improve your knowledge a lot and help to avoid these mistake: mostly on stack overflow and format-string vulnerability. On the same security topic, sudo has a serious flaw for 9 years Check them out and upgrade sudo as well.
If you are confused about term like PKI, CA, x509, intermediateCA then this post help you to fill out that gap
In this article Marvin demonstrate how they revealed parts of the WhatsApp VoIP protocol with the help of a jailbroken iOS device and a set of forensic tools. WhatsApp got a lot attention due to security vulnerabilities and hacks. So it is an interesting target for teaching security analysis
Reverse engineering is a skill many developer lack. Reading these posts help you to know how to do it. Not just reverse engineering firmware, you may apply it to analyze close-source software.
A guide for astronauts (now, programmers using Git) about what to do when things go wrong.
Operating kafka cluster is no joke. Pinterest shares how they do it with a single team that managers over 3,000 Kafka brokers.
Whenever you issue a SQL query to a database…and you want to know whether a column has a NULL value in it…what is the proper way to write a query that will find the result?
A very short article on dangerous of shell globs expansion and why we should use --
when invoking command.
On this same topic, another great post is A Surprisingly Common Mistake Involving Wildcards & The Find Command
explain why using *
is dangerous and why we should wrap into quote like "*"
.
Also checkout another impresive Docker implemented in around 100 lines of bash
CbashSplits tests into even groups (by number of lines or runtime) and runs each group in a single process with its own database.
RubyThe new foundation for graphics and compute
SWIM gossip protocol, its implementation, and improvements
Automate and expose complex infrastructure tasks to teams and services. The database team at Square uses it to provision and decommission databases, safely stop and start hosts, upgrade MySQL and Docker images.
Open Source, Migration Assistance for Kubernetes
a lightweight interactive visualization tool to help AI researchers discover correlations and patterns in high-dimensional data.
WebRTC file transfer - React/TypeScript front end.
find GitHub secrets in real time. Read the introduction post and check demo
instant clones of large PostgreSQL databases to boost development.
Redis-shake is a tool for synchronizing data between two redis databases.
is used to compare whether two redis have the same data.
BetterDev Link
Every Monday