When a system has been live for a long time, it’s not rare to use newer technologies…
The excitement around Apple’s new M1 chip is everywhere. I bought a MacBook Air 16GB M1 to see…
My thoughts before I post Amazon’s response: Running out of file handles and other IO limits is…
Contents hide 1 Overview 1.1 Analysis 1.1.1 The spread of Blackrota 1.1.2 Blackrota backdoor program 1.1.3 Blackrota’s…
In this article, I’ll discuss what Service Topology is, how Linkerd supports it (no config needed), and…
In 2019, the average cost for a corporate data breach reached almost $4 million. Let’s take a look at…
I found the creator of Rainbow Table’s paper, aimed at cryptanalysts, was pretty inaccessible considering the simplicity…
Contents hide 1 Intro 1.1 The motivation behind the lifetimes 1.2 Desugaring 1.3 Subtyping 2 The Rules…
Working with pure functions is simple: you pass arguments, you get a result — no side effects…
This walkthrough will show you how to deploy a containerized Node.js app to Amazon Web Services and…
The purpose of this post is to document our trial, error, and best findings with regards to…
Apple has now released the M1 Apple Silicon chips, and after all the fuzz you may be…
Event Loops! It’s one of those things that every JavaScript developer has to deal with in one…
This post is about perils of concurrency and race conditions. My code was nearly correct, but ultimately,…
Contents hide 1 What (really) happens when you type ls -l in the shell 2 On the…
Please note: this occurred in 2018, and has been properly patched and archived. The vulnerabilities were immediately reported…
OpenBSD-current recently got native support for the Wireguard® VPN, thanks to the work of Matt Dunwoodie and Jason A….
One of many timeless works from Butler Lampson. The patterns are still widely in use to this…
This article details in length about the recently discovered Side channel AttackeD DNS exploit. This article appears…
I had to implement some rather interesting methods to get the functionalities of the Fourier Transform code…
For my money there is perhaps nothing more valuable than in situ kernel debugging. The ability to…
Today, I wanted to take the time to dissect the statement I hear countless times: “Computers are…
A frequently occurring idea for IP tunneling applications is to run a protocol like PPP, which encapsulates…
Key Points Chinese President Xi Jinping halted Ant Group’s historic $37 billion initial public offering after its…
The negotiator entered the chatroom four days after the attack. Hackers had locked down several servers used by…
Today Netlify has emerged as the modern platform for rapidly building web applications without having to worry…
A new skimmer attack was discovered this week, targeting various online e-commerce sites built with different frameworks….
Pfizer and BioNTech’s announcement of preliminary efficacy results for their Covid-19 vaccine candidate is a tiny speck of light at the…
I am a fan of Ubuntu, so I would like to help make it as secure as…
Network segmenting firewall, DHCP, DNS with Unbound, domain blocking and much more Contents hide 1 Introduction 2…