TLDs -- Putting the '.fun' in the top of the DNS
The Domain Name System or DNS is a never-ending source of amusement and amazement. If you have been dealing with just about anything related to operations on the internet, you know that it’s always the DNS in the end, what with its almost 100 different resource records and, uhm, shall we say, “interesting” security threat model.
Moving Quicksilver into production
One of the great arts of software engineering is making updates and improvements to working systems without taking them offline.
Cloudflare’s network processes more than fourteen million HTTP requests per second at peak for Internet users around the world. The configuration when you update on the UI are pushed to the proxy server on the world in real time.
They rewrite that configuration system and rolled it out without the world notice anything.
Poly network Hack
611 million dollars stolen. That’s more than the Mt Gox hack. More than the GDP of several small countries. More than the entire rekt.news leaderboard added together. The biggest cryptocurrency hack… ever.
If you ever wonder how to decode some simple captcha or just convert the captcha picture to text, this article is very approachable. All use standard python library. no big machine learning or AI tool/knowledge required
Pitfalls of rolling your own E2EE protocol Or: An example of a great vendor response
Javier Anton talked about their app “Collaborative Groups”, which the website2 claims is end-to-end encrypted. There is no source available, so all the below is based on a short reverse engineering session of the Android app. This is not meant as an attack on the author. Instead, this should highlight some of the pitfalls of rolling your own encryption protocol.
Impact of Network and Cursor on Query Performance of PostgreSQL
Many times, we see PostgreSQL users getting confused about the query/statement duration reported in PostgreSQL logs. Other PostgreSQL tools like pgBadger present the same data based on the log file, which further increases the confusion. Knowing the full impact of network-related overhead and cursors is important not only to alleviate the confusion but also to get the best performance.
Should the browser use all available memory?
the computer has multiple GBs of free memory, an application such as Chrome should make use of all the available memory in the form of a cache to be as responsive as possible. Makes sense, right?
Code to read
help to kill N+1 queries and unused eager loading
FastImage finds the size or type of an image given its uri by fetching as little as needed. Basically we just fetch enough metadata in EXIF to get the image size
a modular authentication system for the web.
authentication and authorization for Go project/
an easy-to-use immediate mode GUI in pure Rust
Capture keyboard and mouse events for screencasting
Select, put and delete data from JSON, TOML, YAML, XML and CSV files with a single tool. Supports conversion between formats and can be used as a Go package.
Github app to set and encofece security policies on your repository.
allows you to seamlessly connect SQL queries, HTTP requests, scripting, and visualization in a single platform.
the free macOS firewall like LittleSnitch
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this