Hi all,
In last 2 weeks, we came to know about the existence of Pegasus malware, which can run on your phone to steal message, photos, location data. In this issue, I include a link to a guide to help you scan your iPhone. Stay safe online and always aware to not clicking random link, well, except my news leter :). You can count on me.
If you like this newsletter, consider forward it to your friend, tell your co-worker.
Picture the scene. You’re the head engineer at a Formula 1 racing team. The car is damanged very early. Take the car back to garage to fix? Or fix the car from the grid? This is the situation the Red Bull racing team faced in the Hungary 2020 Grand Prix, and what happens next is a glowing example of effective incident response.
Linx is a low code platform with similar power and flexibility as hand-coding. Developers use it to build backend applications and integrate with a wide range of APIs and services.
Did you know that if your site’s under ~12kb the first page will load significantly faster? Servers only send a few packets (typically 10) in the initial round-trip while TCP is warming up (referred to as TCP slow start). After sending the first set of packets, it needs to wait for the client to acknowledge it received all those packets.
Netcat is a tool that reads and writes data across network connections, using TCP or UDP protocol. Netcat has been referred to as the TCP/IP / networking swiss army knife. In this article we’ll look at different applications of netcat and how it can be useful in day to day activities of a pentester, security professional, sysadmin etc…
The Guardian recently published an exposé about Pegasus, a toolkit for infecting mobile phones that is sold to governments around the world. Today, we will look into Mobile Verification Toolkit, which we linked to in issue 208, to check whether your phone is infected.
Ins’t it super easy to just say method=DELETE
on HTML forms? Why do we have to masquerade DELETE/PUT
as POST
in HTML form.
1400 MTU. 1500 MTU. 9001 MTU. 1450 MTU. What are those magic numbers? If you ever config or debug any network issue in a complex setup sooner or later you have to deal with this value? In short, they define a max amount of bytes we can send in a single package.
The author shared his experience dealing with a scienece paper represented a slow implementation of his algorithm and conclude that algorithm is slow. The author went on a journey to optimize automerge, a popular CRDR, to reduce a processing from 5minutes to 0.056 seconds, or 5000x faster.
Lazy-loading is a technique to defer downloading a resource until it’s needed, which conserves data and reduces network contention for critical assets. It became a web standard in 2019 and today loading=“lazy” for images is supported by most major browsers. That sounds great, but is there such a thing as too much lazy loading?
In this guide we’re going to take a look at how we can use cheap and “low end” hardware to build an amazing OpenBSD router with firewalling capabilities, segmented local area networks, DNS with domain blocking, DHCP and more. Even if you aren’t plan to use OpenBSD, it is still useful because almost all components are 100% compatible with Linux such as unbound, or iptable instead of pf.
node.js library for reading and extraction of ZIP archives. load data by chunk to avoid big memory consumption
NodeJSTool to validate PostgreSQL extension upgrade script. It’s an example of writing Postgres extension in Rust
RustA modern SSH client for Mac OS 7/8/9
Finding and deleting near-duplicate images based on perceptual hash.
Fun, play any radios around the globe right from your terminal
A low code developer platform for APIs, integrations and automations.
BetterDev Link
Every Monday