Hi all, some of readers have reached out saying our emails have been marked as spam in Gmail. We’re sending our newsletter from [email protected]. If you add our email address to your contact list, it may help prevent that false positive. Thank you.
In macOS High Sierra, a programming error exposed passwords of encrypted volumes as password hints. Apple released a fix. The author applies a binary diffing technique to learn more about the root cause of the bug.
CSV is often overlooked when coming to security. Here is a list of CSV injection attack, you will be surprised when they execute shell.
What OS is the most used for Docker images? This article analyses Dockerhub Dockerfile to compare popularity.
Writing a crawler is fun as a programming exercise. It requires understanding of distribution, concurrency, rate limiting, dedupe, and deep linking. Pete shares his own approach.
Developers write tests. DevOps should too. It’s hard because we need a K8S cluster. This post explores the ways to create such a cluster in Travis CI.
Time-series data requires lot of space due to high volume of data. But they are usually very compress-able due to similarity of data. Let’s learn about a new compress method in this field.
In Daniel’s machine learning book, he builds a neural network from scratch in Go. In this article, he shares that neural net.
In this post, Julia shares what we need to know to operate K8S network.
A story about finding slowness in new NodeJS version, and methods to figure out anything related to it.
A collection of hacking / penetration testing resources to make you better.
Better Dev Link