Bookmarks (3399)

  • Security Engineering: A Guide to Building Dependable Distributed Systems

    Security Engineering: A Guide to Building Dependable Distributed Systems A free ebook where you can read...

  • screenshot

    Deploys at Slack

    Deploys at Slack This post will outline their process and a few of the major projects...

  • screenshot

    10 Things I Hate About PostgreSQL

    10 Things I Hate About PostgreSQL Despite the click bait title, this is a really good...

  • screenshot

    Attack matrix for Kubernetes

    Attack matrix for Kubernetes While Kubernetes has many advantages, it also brings new security challenges that...

  • Software Engineering Advice from Building Large-Scale Distributed Systems

    Software Engineering Advice from Building Large-Scale Distributed Systems This is PDF file of a talk of...

  • screenshot

    Move Fast & Roll Your Own Crypto

    Move Fast & Roll Your Own Crypto A Quick Look at the Confidentiality of Zoom Meetings....

  • screenshot

    Writing a Low-Level Sound System — You Can Do It!

    Writing a Low-Level Sound System — You Can Do It! In this post, I’ll take a...

  • screenshot

    Writing a Simple Linux Kernel Module

    Writing a Simple Linux Kernel Module A Linux kernel module is a piece of compiled binary...

  • screenshot

    A runc container escape

    A runc container escape On Monday, February 11, CVE-2019-5726 was disclosed. This vulnerability is a flaw...

  • Pointer Compression in V8

    Pointer Compression in V8 When Chrome switched from being a 32-bit process to a 64-bit process,...

  • How an anti ad-blocker works: Reverse-engineering BlockAdBlock

    How an anti ad-blocker works: Reverse-engineering BlockAdBlock How does an anti ad-blocker detect adblockers? And how...

  • screenshot

    A Practical Guide to Memory Leaks in Node.js

    A Practical Guide to Memory Leaks in Node.js Since NodeJS run on V8. You generally can...