SEARCH KEYWORD -- Low level
The rather petite Internet of 1995
As you may know if you’re a regular reader of this blog, sometimes we like to take a trip down memory lane. It’s time for another one of those trips, to the murky past of the Internet and the dawning World Wide Web of 1995.Let’s start first with the people who actually use the Internet. How many were there back then?Worldwide Internet users in 1995Today there are almost 2 billion Internet users worldwide. In 2000, there were 361 million worldwide. But go back even farther in...
Internet,Web,1995,Netscape,Microsoft,Net 2011-05-27 12:50:46
Buffcacher
What should a ‘cache’ be? It means a lot of things, but to my mind the default programming type should be: “keep around expensive-to-generate bits of read-only data in case we need them again, or until the computer really needs that RAM for something else†I was writing a custom video editing program in Python (interesting choice of language for that problem) and I wanted to cache decoded frames; but I just wasn’t happy with the memory management of explici...
Buffer,Cache,Web browser,Memory,RAM 2012-02-24 05:10:10
Understand unsafe in GoLang
Before going to understand unsafe package in GoLang, the first thing needs to talk about is the pointer in GoLang. If you have a background of C language, you must know what pointer means and its usage. With pointer, you are free to operate any data at memory level which means you have great power, but this means that you have great responsibility as well. That's why it might be considered unsafe in lots of cases. Take a look at a simple example of doubling an integer. package main import "fmt"...
Work is not challenging is just an excuse in interview?
Usually when an interviewer asks the interviewee why he/she wants to change his/her job, one answer may be "My current job is not challenging, I want a more challenging job.". The interviewer may tend to think that there are always challenges everywhere and why the interviewee indulges himself/herself without putting much effort on his/her work. Here I want to say something to our interviewers. Work challenging is not equal to personal indulgence. The work is challenging which is an...
OpenLDAP Proxy -- slapd.conf
In the introductory post of OpenLDAP proxy, we mentioned that slapd.conf is the configuration file which tells the slapd service what to do. Apart from this, there is a dynamic way of configuring slapd where the configurations are stored in LDIF database. In the future, LDIF database will be the one for configuring slapd, the old style of slapd.conf is deprecated. The slapd.conf can be converted to LDIF style using the slapdtest command. slapdtest -f /etc/ldap/slapd.conf -F /etc...
OPENLDAP,OPENLDAP PROXY,SLAPD,SLAPD.CONF 2017-10-29 04:01:39
Move.Me Writing Your Own WebSocket Server
The WebSocket protocol has applications beyond plain vanilla web development. I will explain how the protocol works, how to implement your own server and share some insights I had along the way. Before we get down and dirty, I will explain what I’ve been doing with it. At this point I expect many of you are saying “I’m not working on a web game this doesn’t seem relevant to me.†Well, neither am I. I embed a WebSocket server into my game engine and wit...
Socket,NetWorking,WebSocket,Server development 2012-01-28 07:06:43
How does JGSS read Windows native TGT credential?
MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...
KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE 2015-03-25 03:42:32
etcd installation and usage
etcd is an open source and highly available distributed key-value storage system and is commonly used in critical data storage and service discovery and registration use cases. It is focusing on: Simple: well-defined, user-facing API (gRPC) Secure: automatic TLS with optional client cert authentication Fast: benchmarked 10,000 writes/sec Reliable: properly distributed using Raft etcd and Redis both support key-value storage and can be set up in distributed systems. Also Redis supporst more key...
ETCD,TUTORIAL,RAFT,DISTRIBUTED SYSTEM 2021-03-07 03:10:33
Web Security: In-Depth Explanation of X-XSS-Protection
What is X-XSS-Protection X-XSS-Protection is an HTTP response header designed to enable or configure built-in cross-site scripting (XSS) filters in certain versions of Internet Explorer, Chrome, and Safari. The purpose of these filters is to detect reflected XSS attacks in the response and prevent the loading of pages, thereby protecting users from such attacks. The X-XSS-Protection response header was initially introduced by Microsoft in Internet Explorer 8 to control the browser's XSS filter. ...
X-XSS-PROTECTION,WEB SECURITY,CONTENT SECURITY POLICY,XSS,CSP 2023-11-29 01:48:40
Why do so many technical recruiters suck?
It’s Tuesday, I get a call from an unknown number. There is a little hesitation, but I finally pick it up. My number is listed on my business card and I feel like I should get these calls unless I am in a meeting.- Hi, is this Mike?- Yes, speaking….- Hi Mike! How are you today?- Fine…- I am calling from XYZ Co, and we deal with recruiting and staff augmentation. I was wondering if you are looking for software developers.We are in San Francisco and itâ...
Recruitment,HR,Sucks,Tech recruiter 2011-11-13 08:22:02
RECENT
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- more>>