Shamir's Secret Sharing Scheme
How we can securely share a secrets among N parties so we need all parties to form the original key,
but if one lost their part of original key we can still restruct the original key. Adi Shamir was thinking about in 1979.
Every 7.8μs your computer’s memory has a hiccup
Data is stored by the charge (or lack of it) on a tiny capacitor within the RAM chip.
These capacitors lose their charge over time, mean losing data. We need to refresh
to restore the charge. RAM is blocked when this occurs. So how often this happen? Yes,
Model View Controller isn't
The MVC pattern is everywhere. Web frameworks use. Apps use it. GUIs use it. Well, actually they don’t use MVC. It is just a marketing lie. They use something else like MVA.
Fast, Constant Time Sphere Indexing
Problem: Assuming a triangle-subdivided sphere, map any 3D point on or above it to a triangle index in constant-time, without using recursion, table lookups or complicated branching logic.
On React’s usage of linked list in Fiber to walk the component’s tree
Fiber is the newest implementation of change dectection.
Besides solving real problems of application developers, the internal implementation of these mechanisms has a wide appeal from the engineering perspective. There’s such a wealth of knowledge in the sources that will help us grow as developers.
An informal top-level overview of terms used in concurrent computing. The motivations are to provide an unfragmented resource on a topic of wide relevance, to disambiguate overloaded terms and to aid natural understanding by contextualizing certain terms more broadly than their conventional meanings
A Speed-Up for Charting on Embedded
When we need to visualize a large array with low-profile hardware, say 500,000 data points in a single render pass.
We need to cheat by drawing each vertical pixel column as one line reaching from the minimum sample to the maximum sample
instead of individual points.
Code to read
Multi-platform Nintendo Game Boy Color emulator
Ruby gem for extracting tables from PDF as a structured info
A complete text editor for your terminal
Beginner Pentesting Toolkit/Framework
Graph theory / network library for analysis and visualisation
A tool to capature the tcp packets, and analyze the packets with LUA
Frustrated to config Raspberry wifi because you need a screen and keyboard
for wifi config before you can SSH into. No more.
Get your headless Raspbian into your WLAN without using the console.
Fast and flexible Docker image build tool designed for containerized environments such as Mesos or Kubernetes.
Lambda function to “rip apart” a CloudFormation template and check it for security compliance”
man-in-the-middle attack framework used for phishing login credentials with sessions cookie so it can bypass MFA.
Scan Wordpress, Drupal, Joomla, vBulletin websites for Security issues
convert a smtp request (email) and send it to the specified webhook
single utility to create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar
Uses LXC to simulate a small-scale internet-like environment for intrusion,
find potentially sensitive files pushed to public repositories on Github
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this