Automating MySQL schema migrations with GitHub Actions and more
Everywhere I works, at some point the problem of data schema migration occurs. So seeing big company like
Github build tools, and share their workflow is super useful for us. We may not need to implement whatever
they did but at least we can see how others are doing it. I usually like to share this kind of article a lot
because they are what people are doing, way better than any theory-only article.
How to escalate privileges and steal secrets in Google Cloud Platform
This post does not outline any new vulnerabilities in Google Cloud Platform but outlines ways that an attacker who has already gained an unprivileged foothold on a cloud instance may perform reconnaissance, privilege escalation and eventually complete compromise of an environment.
A Graduate Course in Applied Cryptography(PDF)
Say Alice wants to talk to Bob securely? They need to share a key to secure their conversation.
But how do they secure the process of sharing the key? This books help you implement these kind of systems
EV Certificates Make The Web Slow and Unreliable
I’m never a fan of EV cert. They added no value yet cost lot of money. The EV certificate significantly increases the time it takes to secure the connection between browser and server and therefore extends how long users stare at a blank screen, waiting for the page to start rendering
Browser are fundamental in our daily life but we usually consider them as a blackbox with a massive code base. So how we learn more and hack on them? This post is a list of resource for fundamental understanding, books, tools to dive into browser internally. If you don’t have much time, at least read How Browsers Work and The Chrome comic book
Code to read
an open source intercept proxy written in Go. Like Charles Proxy or MITMProxy. It makes use of goproxy as core proxy implementation and the interface is implemented with QT.
an implementation of ChaCha20 in Bash script
This is an implementation of Git using (almost) entirely POSIX shell.
🎨 Diagram as Code for prototyping cloud system architectures
provides a small DSL to check your data for inconsistencies.
At this point, sort is solved proble. Just use any sort implement in your standard library or some
well-know implement of fast sort algorithm. Yet, people are still researching in this area, to find
provides detailed session and/or object audit logging via the standard PostgreSQL logging facility.
web server scanner for security
Explore, map, compare, and download U.S. data
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this