Reverse Engineering Malware 10
Reverse engineering is fun. But tutorial are usually just used as a basic building block. This is a great reverse engineering workshop on a real malware. You will also learn to setup a workflow for malware analysis.
Web Developer Security Checklist
Developing secure, robust web applications in the cloud is hard… very hard. This is a simple check list with some starting points to secure your application better.
Every Server In The World Is Vulnerable
What if I told you every server is vulnerable? The problem lays in the foundation layer of almost every language: Hash table, hash map, dictionary or anything similar that allow O(1) access set of data with a key.
Mental Models in API design
Normal points out two mental model for product design: the user mental model, and the product designers’ metal model. The goal of the product designer is to provider an accurate metal model. Same thing apply to API design. We go through Swift APIs to see differences between the two models
Typography: Guide for Beginners
Text is the building block of content. To create effective UI and clear UX, learning the basics of typography is necessary.
Linux Load Averages: Solving the Mystery
Linux load averages track not just runnable tasks, but also tasks in the uninterruptible sleep state. But why? Let’s solve this mystery and summarize load averages.
Always Be Closing: A Go Resource Leak
Not closing resources after use is a great way to accumulate leaking due to resources being retained in memory. Always closing is better than relying on automatically closes by timeout. This post dives deep into how the ‘Square’ team figured out resource leaks use various tools and debug techniques.
More Dangerous Subtleties of JOINs in SQL
Semantic errors are especially insidious because they can remain undetected for months until people happen to look in the right places. The post covers two major semantic errors: JOIN duplications and JOIN misses.
Compression is everywhere. But what really happens when you make something smaller than it is? Will the compression algorithm go wrong and make item bigger than it is? Let’s get to work.
832 TB – ZFS on Linux
A project to store 832TB of data cheaply with ZFS: from choosing file systems to building out our server.
Git From The Inside out
Git is very easy to get started with. But it gets in your way in complex situations. In this post, we look at Git via it’s graph data structure and build our mental model on truths rather than hypotheses constructed from evidence gathered while experimenting with the API.
Understanding Service Workers
Service Workers is a script browser runs in background separate from a web page. It opens the doors to some nice feature such as: offline availability, enhanced performance, and push notifications. Let’s see what they can do and how to implement them.
Predict the Future with Machine Learning
Machine Learning is effectively software that works like our brain. In this post, we take a top-down approach attempting to make it crystal clear. What it i, and what it can be used for in the real world.
A Deep Dive into CSRF Protection
Rails developers use CSRF all the time. Let’s deep dive into the Rails codebase to understand how the feature has been implemented.
Zero to Production Elixir in 1 month
A story of migrating a production ‘upload and retrieve’ document system from Ruby (paperclip) to Elixir. A two part series. An interesting point is retrieving the file right after uploading directly from memory without hitting S3.
Nmap Cheat Sheet
Nmap is a powerful tool with so many parameters. Let’s level up our Nmap skills with this cheat sheet.
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this