Ethernet and IP Networking 101 (Heavily Illustrated)
Network segment, broadcast address, VLAN, subnet mask. If you feel dizzy with these terms then check out this post. It’s a nice recap of IP networking which we may overlook when working on higher layers such as backend or frontend. Even if you aren’t a network engineer, this helps you when setting up AWS VPC for example
Don't let collation versions corrupt your PostgreSQL indexes
Collations and dependencies are nerdy topics a bit like leap seconds and time zones: you know, the kinds of obscure things you don’t normally have to worry about until something is broken. If you like gory details, the UCA is both fascinating and terrifying (my favourite part is “backward accent ordering” which shows up in some French variants but not others).
Recovering a full pem private key when half of it is redacted
a write-up covering how given a partially redacted PEM, the whole private key can be recovered. The Twitter user, SAXX, shared a partially redacted private RSA key in a tweet about a penetration test where they had recovered a private key. Precisely, a screenshot of a PEM was shared online with 31 of 51 total lines of the file redacted.
That's a lot of databases
We linked to this blog of Kristian Köhntopp a few time. Today is a new post about a complicated MySQL setup. The databases are being organized in replication hierarchies, and each hierarchy is a tree topology with a single primary and a number of intermediate replicas. And yes, it really is a lot of databases
SQLite is not a toy database
Look into a few features of SQLite to show that you it was underrated and how we can make use of modern SQL feature like JSON query, CTE
Sundial: Fault-tolerant Clock Synchronization for Datacenters
This paper is about clock synchronization in the data center. I presented this paper for our distributed systems zoom meeting group. I took a wider view of the problem by explaining time synchronization challenges and fundamental techniques to achieve precise time synchronization
Engineering Failover Handling in Uber’s Mobile Networking Infrastructure
A core component of Uber networking stack is the failure handler that intelligently routes all mobile traffic from applications to the edge infrastructure. Uber’s failure handler was designed as a finite state machine (FSM) to ensure that the traffic sent via cloud infrastructure is maximized. During times when the cloud infrastructure is unreachable, the failover handler dynamically re-routes the traffic directly to Uber’s data centers without significantly impacting the user’s experience.
How to Improve CSS Performance
This post will cover what kinds of performance issues CSS can cause and best practices for crafting CSS that doesn’t get in people’s way
Code to read
Goroutine leak detector
Yank terminal output to clipboard
A fuzzy search tool for the command-line
command-line tool and library for generating regular expressions from user-provided test cases
A supercharged version of paperless: scan, index and archive all your physical documents
Interactive CLI to better navigate and switch Git branches.
Good-lookin’ diffs. Actually… nah… The best-lookin’ diffs. 🎉
a tool created to dynamically query Indicators of Compromise (IoCs) on hosts with a single package, outputting data in a JSON format for further analysis in a SIEM or other tool. CHIRP does not modify any system data.
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this