Hi, We are going to get lots of holidays till the end of the year. That means more time to improve our skills. BetterDev aims to serve you well. You can help spread the word by share on twitter
How we can securely share a secrets among N parties so we need all parties to form the original key, but if one lost their part of original key we can still restruct the original key. Adi Shamir was thinking about in 1979.
Data is stored by the charge (or lack of it) on a tiny capacitor within the RAM chip. These capacitors lose their charge over time, mean losing data. We need to refresh to restore the charge. RAM is blocked when this occurs. So how often this happen? Yes, every 7.8μs
The MVC pattern is everywhere. Web frameworks use. Apps use it. GUIs use it. Well, actually they don’t use MVC. It is just a marketing lie. They use something else like MVA.
Problem: Assuming a triangle-subdivided sphere, map any 3D point on or above it to a triangle index in constant-time, without using recursion, table lookups or complicated branching logic.
A free book with code examples, covers core concepts like: hashes(SHA3, BLAKE2, MAC code(HMAC, GMAC), key derivation functions(Scrypt, Argon2), key agreement protocols (DHKE, ECDH) and more.
Fiber is the newest implementation of change dectection. Besides solving real problems of application developers, the internal implementation of these mechanisms has a wide appeal from the engineering perspective. There’s such a wealth of knowledge in the sources that will help us grow as developers.
There’s only one hard problem in computer science: recognising that cache invalidation errors are misnamed. They’re just off-by-one errors in the time domain.
An informal top-level overview of terms used in concurrent computing. The motivations are to provide an unfragmented resource on a topic of wide relevance, to disambiguate overloaded terms and to aid natural understanding by contextualizing certain terms more broadly than their conventional meanings
Creating a shell is a great way to understand how the shell, terminal emulator, and OS work together.
When we need to visualize a large array with low-profile hardware, say 500,000 data points in a single render pass. We need to cheat by drawing each vertical pixel column as one line reaching from the minimum sample to the maximum sample instead of individual points.
Lets’ learn typography in ten minutes. Beside amazing content, this website itself is amazing too because its author build a publishing system call Pollen.
Frustrated to config Raspberry wifi because you need a screen and keyboard for wifi config before you can SSH into. No more. Get your headless Raspbian into your WLAN without using the console.
C++QMLHow the SQL database will constantly outperform any hand written data retrieval algorithm
Fast and flexible Docker image build tool designed for containerized environments such as Mesos or Kubernetes.
Lambda function to “rip apart” a CloudFormation template and check it for security compliance”
man-in-the-middle attack framework used for phishing login credentials with sessions cookie so it can bypass MFA.
Scan Wordpress, Drupal, Joomla, vBulletin websites for Security issues
convert a smtp request (email) and send it to the specified webhook
single utility to create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar
Uses LXC to simulate a small-scale internet-like environment for intrusion, firewall, IDS…
find potentially sensitive files pushed to public repositories on Github
BetterDev Link
Every Monday