Do Not Use '>' in Your Command Prompt (and How to Stay Safe in Shell)
Over the years of troubleshooting performance problems in the Unix/Linux world, I have seen multiple cases where a regularly used command line tool in a customer server just stops working for some reason. The tool just returns immediately, doing absolutely nothing. No output printed, no coredumps and the exit code is zero (success!). This article walks you through a couple of such incidents and in the end I explain how I avoid accidentally doing bad stuff in production in general
Construct an Undo Tree From a Linear Undo History
Have you ever try to undo some code typing, then want to undo…the undos to revert it back and realize you cannot do that.
How can we build an undo system that allow us to go back to any previous buffer. It’s being used in Emacs and a bit Lisp heavy but I think it’s useful for even non-Emacs user to know about that kind of data structure
Migrating Millions of Concurrent Websockets to Envoy
Slack strategy to migrate from HaProxy to Envoy for their websocket service. They use weighted routing to shift traffic HAProxy to Envoy.
After a very long and exciting 6 months, the migration was complete and the entire HAProxy websocket stack was replaced with Envoy Proxy globally with zero customer impact.
Backups and Replication
Look into lower layer of what exactly happen when MySQL backup data with binlog and use this binglog for replication
How NetNewsWire Handles Threading
In their words: we try, as much as possible, to not use queues or threading at all. I can’t emphasize this enough: the best way to handle concurrency is just to not do it.
TCP/IP Fingerprinting for VPN and Proxy Detection
How can we know if an user use a VPN or Proxy to access our site? The hypothesis is that different operating systems (and different minor versions among those operating systems) use different default values in their initial TCP SYN packet that initiates the TCP three-way handshake. An interesting technique and a great read that dive into network knowledge and some Python code :-)
A collections of resources to learn Deep Learning in the form of Modules available through the sidebar on the left. As a student, you can walk through the modules at your own pace and interact with others thanks to the associated digital platforms.
Code to read
Get image size without full download. A very interesting project. It works by fetching only header data of images where it contains image size so we don’t have to download full image and read them all into memory
Generate a Go ORM tailored to your database schema. Best used when you already have your database pre-defined and managed by other system. Now you want an ORM/Model class to access them quickly.
helps a forensics analyst explore offline Docker filesystems. When analyzing a system where a Docker container has been compromised, it can be useful to have the same view of the filesystem as the container’s
Organize ActiveRecord models into a tree using PostgreSQL’s ltree datatype
an open source online database tool and Airtable alternative. Think of its like google sheet with an API to access data.
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
a open source feature flag & toggle system, that gives you a great overview over all feature toggles across all your applications and services. It comes with official client implementations for Java, Node.js, Go, Ruby, Python and .NET Core.
bring remote video feeds into OBS via WebRTC
an experimental modernized git CLI built on top of git that provides happy defaults and other niceties:
A loud native Identity and User Management System in the world. Finally, it is no longer necessary to implement a User Login process for the umpteenth time!
A tool that let you run SQL directly in browser on a few dataset. Great if you want to try out some SQL really quick
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this