This Flâneur is a stroll through intermediate data structures and their associated algorithms, from the point of view of functional programming.
A free to read book to document known and unknown methods of doing various tasks using only built-in bash features. Using the snippets from this bible can help to remove unneeded dependencies from scripts and in most cases make them that little bit faster.
Running HTTPS during development helps to have more identical dev vs prod environment? How do we get a certificate for localhost without getting the big warning? How do you get the green lock locally?
DNS rebinding use very short-ttl dns entry. It allows a remote attacker to bypass a victim’s network firewall and use their web browser as a proxy to communicate directly with devices on their private home network.
Julia explains the 5 main things she use Wireshark for, and hopefully you’ll have a slightly clearer idea of why it’s useful.
This post illustrates GitHub’s MySQL high availability and master service discovery solution, which allows us to reliably run a cross-data-center operation, be tolerant of data center isolation, and achieve short outage times on a failure.
This guide is written for the person very new to firewalling. Hope that this give you enough of a grasp of using pf so that you will then be able to go to those more advanced guides and perfect your firewalling skills.
“Our k8s master servers are rebooting randomly every day!” How do we troubleshoot this kind of issue?
Web Assembly bring hope that it would allow us to write web applications without the typical Javascript build process. When Web Assembly(wasm) support landed in Go recently, I knew that the time was ripe for some experimentation.
Go code can be statically linked, and so requires no installed libraries. How about VM? Could you have a VM that’s just a linux kernel and your Go binary? I suspect it is not vulnerable to many known linux security issues as it contains zero standard user-space components.
BetterDev Link
Every Monday