A repository with resource(link, course) to lean about security
JavaScript string encoding is all over the place. Let’s try to straighten out how it works
Why Ruby’s scheme for memory allocation doesn’t play nicely with copy-on-write, and how a compacting garbage collector will help
An explanation covering the tokenization, parsing, and compilation of Ruby programs
Selenium is a way to do end to end test, where a real browser performs tasks as if a real user. This is a post about configuring and writing selenium test
HipMuck strategy to shard data into many sub-tables, select which table to query or even query many of them. Small tables can be put on different smaller instances, Read/Write can happen parallel
Redis creator implements a fade effect with Feistel Network
In this blog post we would like to explain how V8 handles JavaScript properties internally.
PostgreSQL 9.6 was the first release, which allowed to run a query on many nodes or CPUs. Let’s experiment with this feature
Although blockchain technology is fundamentally more secure than centralized database systems, the ecosystem is still incredibly young and has many security vulnerabilities, especially with systems built around blockchains.
JavaScritp uses `, or back-tick for template literals. Let learn how to use multi-line strings to bypass Reflective XSS Protection
The author implements a VI-like editor in C
Filippo looks into Restic, a backup solution written in Go, and review its encryption model
Using UserNamespace to separe host root user from docker root user
Convert a simple webcam to a fancy digital peephole viewer with motion detection features
BetterDev Link
Every Monday