Hi all, some of readers have reached out saying our emails have been marked as spam in Gmail. We’re sending our newsletter from [email protected]. If you add our email address to your contact list, it may help prevent that false positive. Thank you.
In macOS High Sierra, a programming error exposed passwords of encrypted volumes as password hints. Apple released a fix. The author applies a binary diffing technique to learn more about the root cause of the bug.
CSV is often overlooked when coming to security. Here is a list of CSV injection attack, you will be surprised when they execute shell.
Part 4 of a series dedicated to exploring JavaScript and its building components. This part talk about drawbacks of single-threaded environments and how to overcome them.
What OS is the most used for Docker images? This article analyses Dockerhub Dockerfile to compare popularity.
Writing a crawler is fun as a programming exercise. It requires understanding of distribution, concurrency, rate limiting, dedupe, and deep linking. Pete shares his own approach.
Developers write tests. DevOps should too. It’s hard because we need a K8S cluster. This post explores the ways to create such a cluster in Travis CI.
Time-series data requires lot of space due to high volume of data. But they are usually very compress-able due to similarity of data. Let’s learn about a new compress method in this field.
In Daniel’s machine learning book, he builds a neural network from scratch in Go. In this article, he shares that neural net.
In this post, Julia shares what we need to know to operate K8S network.
A story about finding slowness in new NodeJS version, and methods to figure out anything related to it.
A collection of hacking / penetration testing resources to make you better.
BetterDev Link
Every Monday