Many companies allow access to their private resources on a third party tool when signing up with company email. A common feature on many SaaS application is allow email forwarding from their domain to your account. Now, you suddenly have an email with that company’s domain.
This guide is intended to help you secure your organization’s email in two distinct ways: protecting email content and to prevent faking sender addresses.
Floating point number sometimes cause interesting bugs. Example: 0.1 * 0.2 may yield 0.020000000000000004 instead of 0.02. So let’s learn how they are organized and stored.
You log in to a Linux server with a performance issue: what do you check in the first minute? Netflix shares their flow to check performance in first 60 seconds.
After years of being left for dead, SQL today is making a comeback. How come? And what effect will this have on the data community?
The article provides a systematic description of techniques related to distributed operations in NoSQL databases.
An in-depth presentation of the concepts and algorithms used in parsing, so that you can get a better understanding of this fascinating world.
How does Ruby store data on heap? What does it look like when we draw them out? In this article, Aaron shares a program to visualize the layout and fragment of a Ruby heap dump.
A remote code execution on the iPhone 7 up to iOS 10.3.
Understanding blockchain can be overwhelm nowadays. Let’s learn by building one so we can understand how they really work.
Yes, we will learn how to write one that runs within QEMU. We’ll learn a bit about OS kernel, userland code, Ring-0
This is a material from a 2-day workshop for micro service evolutions.
BetterDev Link
Every Monday