If you feel fuzzy when dealing with so many openssl command and option generate CSR, cert, private, pem, CA, intermediate cert chain… and other thousdand thing then you are like me. That’s why this week I tried to dive deep into TLS. I want to see how can we run our own CA.
I have been trying to learn more about PKI, TLS, CA and all others 3 letters acronym concept in TLS. In this article, We’ll create a basic certificate authority (CA) for ad-hoc experiment, to issue key for internal/private service. You should also checkout how to build your own public key infrastructure by Cloudflare and public key infrastructure and other concepts by packtpub
The author also wrote other 5 parts. Make sure you check them out. We will work on a game call Aqua And Ashs with code on Github
How TCP_NODELAY cause an extra 200ms to ElasticSearch request. This is why Julia think Why you should understand (a little) about TCP
Over the past years the V8 garbage collector (GC) has changed a lot. The Orinoco project has taken a sequential, stop-the-world garbage collector and transformed it into a mostly parallel and concurrent collector with incremental fallback.
Tech talk is a great way to improve your knowledge on a topic. It forces you to dive deep. Dan, the author of Redux, shares some advices on giving tech talk.
Smartphones often take very bland photos in comparison to high-end DSLRs. Deep learning changes all of that.
Fourier transforms are a tool used in a whole bunch of different things. This is a explanation of what a Fourier transform does, and some different ways it can useful. And how you can make pretty things with it
An novel approach to avoid single point of failure in MySQl with the tradition master-slave model. We write to multi masters now, and read from slaves. However, the salve are replicated from many masters.
perfect_hash.py provides a perfect hash generator which is not language specific. Read the explaination and illutastration
A Ruby gem that provides code completion and inline documentation for IDEs through Microsoft’s language server protocol
RubyStory of Data Validation @ Netflix
Some common places for signs of app design degradation, showing steps to take to improve the code
Swiss army knife for hackers
A tool to scan Kubernetes cluster for risky permissions
a personal knowledge repository for PDF and web content supporting incremental reading and document annotation
a free, encrypted, and open-source email forwarding service for custom domains
BetterDev Link
Every Monday