Deploys at Slack
This post will outline their process and a few of the major projects that got them to where they are.
Attack matrix for Kubernetes
While Kubernetes has many advantages, it also brings new security challenges that should be considered. Therefore, it is crucial to understand the various security risks that exist in containerized environments, and specifically in Kubernetes.
Move Fast & Roll Your Own Crypto
A Quick Look at the Confidentiality of Zoom Meetings.
I don’t like to include trendy news in my news letter, because it isn’t helpful for future self and doesn’t age well.
However, this isn’t a normal article that bash on Zoom but has real methodlogy that they use to analyze zoom, which you can
learn the techniques from them.
Writing a Low-Level Sound System — You Can Do It!
In this post, I’ll take a look at what it takes to write a low-level sound system. I.e., one where you do all the sampling, mixing, effects, etc by yourself. Though this may seem like a daunting task it is in fact pretty straightforward, depending on what features you want to add.
Writing a Simple Linux Kernel Module
A Linux kernel module is a piece of compiled binary code that is inserted directly into the Linux kernel, running at ring 0, the lowest and least protected ring of execution in the x86–64 processor. Code here runs completely unchecked but operates at incredible speed and has access to everything in the system
Another article on this topic
A runc container escape
On Monday, February 11, CVE-2019-5726 was disclosed. This vulnerability is a flaw in runc, which can be exploited to escape Linux containers launched with Docker, containerd, CRI-O, or any other user of runc. But how does it work? Dive in!
Pointer Compression in V8
When Chrome switched from being a 32-bit process to a 64-bit process, it gave Chrome better security, stability and performance, but it came at a memory cost since each pointer now occupies eight bytes instead of four. We took on the challenge to reduce this overhead in V8 to try and get back as many wasted 4 bytes as possible.
Code to read
A minimal solution to hand motion capture from a single color camera at over 100fps. Easy to use, plug to run
Fast high-level web crawling Ruby framework
A fast TCP tunnel over HTTP
A list of public apis: weather, geo coding, currency, html to pdf converter etc
a toolkit to help you manage, manipulate, customize, and apply Kubernetes Resource configuration data files
App that helps you monitor your Kubernetes cluster, debug critical deployments & gives recommendations for standard practices
Modern CLI for Apache Kafka, written in Go
A multi-user music server with a focus on participation
check the SEO aspects of your site for you, and will provide advice in case of problems.
a free PostgreSQL tool which allows you to monitor execution plans in real-time
A UDP to TCP proxy server for sending HTTP requests with zero roundtrips
high-performance sidecar load-balancer. sidekick automatically avoids sending traffic to the failed servers by checking their health via the readiness API and HTTP error returns
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this