Write a Hash Table in C
Hash tables allow quick and scalable insert, search and delete, and are relevant to a large number of computer science problems.
How to Write Your Own Compiler
While an older article, it made use of LLVM as a backend to generate code. It describes a complete compiler for a real programming language and is organized to demonstrate how to design and implement the successive phases of the compilation process.
Practicing Elixir or Any Programming Language
A good way to learn any programming language is to repeat the same process in other languages. The author shares a skeleton process to do this by focusing on algorithm, TDD, structuring code, and learning the tool.
Bypassing VirtualBox Process Hardening on Windows
This blog post will describe the implementation of Oracle’s VirtualBox protected process and detail three different, (but now fixed), ways of bypassing the protection and injecting arbitrary code into the process.
Hash Flooding Vulnerability in Node.js
In July, Node.js released a fix for a hash flooding vulnerability. This post provides some background and history on the vulnerability and the eventual solution.
On Piping curl to apt-key
Piping curl to bash is dangerous. Many projects no longer advertise this installation method. But what could go wrong with piping curl to apt-key?
An OSI Layer Model for the 21st Century
On the modern Internet, cryptography is typically squeezed into a single, incredibly complex layer, TLS, which had three entirely unrelated bugs discovered in three months in 2014. What if cryptographic functions were spread out over more layers?
Serverless Raspberry Pi Cluster with Docker
The author recently released OpenFaas, a serverless framework for Docker & Kubernetes. Now he shows us how to create our own Serverless Raspberry Pi cluster with those tools.
How Go Scales (Video)
What exactly makes Go program scale? In this session, we’ll look at the design of the Go language and runtime, and compare it to other technologies.
IPv6 Performance Revisited
In this article, the author reports the results of a large-scale measurement of IPv4 and IPv6 performance looking at the relativities of IPv6 and IPv4 performance.
Securing Cookies in Go
John Calhoun explains about potential issues with cookie and how to mitigate them. It’s in Go but the theory can be applied to any language.
Can we really perceive a difference between 5 ms latency and 45 ms latency? Turns out we can, presents the author.
Paint Timing API in Chrome 60
Yet another addition to the burgeoning Performance API, but instead of capturing page and resource timings, this new API allows you to capture metrics on when a page begins painting.
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this