This cheatsheet is intended to run down the typical steps performed when conducting a web application penetration test. Author breaks these steps down into sub-tasks and describe the tools they recommend using at each level.
As a programmer, we may forget all thing about math. Or if you’re a self-taugh developer, you may not get expose to math. This is a good PDF file to learn math. We will know about number theory, RSA encryption,…
A weird error when accessing file system for a R package. The error is gone by disable logging. Exact cause is still unsure though.
Probablistic filters are high-speed, space-efficient data structures that support set-membership tests with a one-sided error. Positive responses incur a small false positive probability (FPP).
Sometimes take a break from software and hack on hardware is fun. We see how to compile Go for a special CPU on very small hardware and doing hardware hello world: blink led.
This isn’t a technical post but more about method and strategy. I think it send out a right message to make us become better.
Hyperbolic click-bait title aside, I wish to convince you that the effective Tech Lead is a force-multiplier and a unicorn-cousin of the famed 10x engineer
Finding the beat in HR sensor data. We’ll take a Pulsesensor and using it to build a working heart monitor with OLED pulse, BPM and trace display, using MicroPython on a Wemos D1.
A deep look at what problem ES modules solve and how they are different from modules in other module systems.
Lots of work on the goal of Ruby 3 with 3x performance. Even if you are not writing Ruby, you’re still get lots of knowledge about JIT, RTL Instructions…
DevOps probably has to deal with SSH tunnels a lot to access some private service on LAN/Local only without a VPN. In this, we try to implement in Elixir because Erlang has an SSH application.
BetterDev Link
Every Monday