Web Application Penetration Testing Cheat Sheet
This cheatsheet is intended to run down the typical steps performed when
conducting a web application penetration test. Author breaks these steps
down into sub-tasks and describe the tools they recommend using at each
Mathematics for Computer Science
As a programmer, we may forget all thing about math. Or if you’re a
self-taugh developer, you may not get expose to math. This is a good PDF
file to learn math. We will know about number theory, RSA encryption,…
A debugging journey
A weird error when accessing file system for a R package. The error is
gone by disable logging. Exact cause is still unsure though.
Probabilistic Filters By Example
Probablistic filters are high-speed, space-efficient data structures that
support set-membership tests with a one-sided error. Positive responses
incur a small false positive probability (FPP).
Go on very small hardware (Part 1)
Sometimes take a break from software and hack on hardware is fun. We
see how to compile Go for a special CPU on very small hardware and
doing hardware hello world: blink led.
Master your tools
This isn’t a technical post but more about method and strategy. I think
it send out a right message to make us become better.
Building a MicroPython heart rate monitor
Finding the beat in HR sensor data. We’ll take a Pulsesensor and using it to build a working heart monitor with OLED pulse, BPM and trace display, using MicroPython on a Wemos D1.
Towards The Ruby 3×3 Performance Goal
Lots of work on the goal of Ruby 3 with 3x performance. Even if you are
not writing Ruby, you’re still get lots of knowledge about JIT, RTL
Implementing SSH tunnels in Elixir
DevOps probably has to deal with SSH tunnels a lot to access some private
service on LAN/Local only without a VPN. In this, we try to implement
in Elixir because Erlang has an SSH application.
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this