Hi everyone, Welcome to issue #153. This week, I found a free course on Network Security, on OpenLearn. It’s a short course and part 5) Implementing encryption in networks, looks pretty good.
Amazing project. Use notepad as a ASCII display to render and play animation of an object to do ray tracing. One of cool thing is it search memory of a process, find a pattern to find the memory address that hold NotePad display text, and change it constantly to simulate re-rendering.
Apple Photos keeps photo metadata in a SQLite database. It runs machine learning models to identify the contents of every photo, and separate machine learning models to calculate quality scores for those photographs. All of this data lives in SQLite files on my laptop
HTTP/3, QUIC, user-space TCP/IP stack. What is the meaning of development a tcp/ip stack in user-space? How does kernel handle incoming package. How does it know where to send package to.
This guide is a complete, summarized WebGL tutorial, with tiny interactive demos in each chapter. Starting nearly from scratch, you’ll be able to create your own 3D interactive scenes without needing to use any library or framework: only vanilla JS & WebGL. My goal was to gather all the information and tricks about WebGL I found scattered everywhere, and present them in a short and helpful way.
You don’t truly understand something until you’ve implemented it yourself, so I wanted to write an article that lets people play around with a simple thread implementation. In this post, we’ll implement simple threads in a normal C program (not an operating system).
Troubleshooting is both a science and an art. The first step is to make a hypothesis about why something is behaving in an unexpected way, and then prove whether or not the hypothesis is correct. If the issue is too vague, then you need to brainstorm in order to narrow down the problem—this is where the “artistic” part of the process comes in. Another similar story from Twitter: Hunting a Linux kernel bug
What the agent is, how to use it, and how it works to keep your keys safe, how it works. reduce your risk when using agent forwarding, and an alternative to agent forwarding that you can use when accessing your internal hosts through bastions.
Prometheus is a monitoring and alerting system. It is very different from traditional system alerting where it scrape metric instead of you writing metric to it. When scraping, the data is pre-aggreated, so the way to query it is more about trending than individual event. Being different, it has a high learning curve.
The second of a four-part blog series documenting the different structures and stages of the firmware update. Looking in the blackbox, reverse engineer both of protocol to update and firmware format
Useful if you already use ZSH.
The notifications server for Covid-19 exposure. I do not think you need to install it but good to see how google write these kind of code. They even had terraform module for it as well.
GoA hand-wired USB & BLE keyboard powered by Python. Yes, the firmware is in Python.
Python13 videos about reliability and resilience engineering
digitalocean tools to help you generate Nginx config interactly
A simple macOS app that lives in your menu bar to visualize Pi-hole information
A tool for refactoring code related to feature flag APIs
the simple WireGuard VPN server GUI community maintained
a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains many CIS contols and checks to help GDPR, HIPAA
A community-driven collection of open source tools to improve the security of your Google Cloud Platform environments.
Continuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to AWS Security Hub for further aggregation and analysis.
WT login microservice with plugable backends such as OAuth2, Google, Github, htpasswd, osiam
BetterDev Link
Every Monday