A dive into how files are stored on disk, what the heck is inode, and how to access all of that manually.
#linux #os #file
#linux #os #file
Russ Cox's post about implementing coroutines for go. Yep, coroutines, not goroutines. The main idea is to allow running something on demand, concurrently, but not in-parallel. I don't really understand the use case yet, but can recommend the post, interesting reading.
#golang #coroutine
#golang #coroutine
A bunch of links about DNS have piled up, let's start with them. The 1st one - a talk on what's DNS, how it works, how to poke it, and what the request and response look like.
#dns #network #talk
#dns #network #talk
And here you'll find a step-by-step guide to implementing your own toy DNS resolver in python. Exercises at the end are entertaining too!
#dns #network
#dns #network
And the last one: why it's hard to debug DNS issues, a bit of rant on hardly human-readable output of some tools, and advice on how to approach such tasks.
#dns #network
#dns #network
More exciting news from JS world: it turns out that NPM registry doesn't validate package manifest against its content.
#js #cybersec #vulnerability
#js #cybersec #vulnerability
The story of UTF-8 encoding. Rob Pike and Ken Thompson have built a spec and an implementation for Plan 9 OS literally in a couple of days.
#history #text #encoding
#history #text #encoding
Zero-knowledge proof is a big thing in modern cryptography. Here's a post on how to start playing with it right now, without deep and thorough research. Don't expect deep understanding after it, but code samples and further reading links are truly valuable.
#zk #cryptography
#zk #cryptography
Moderately deep dive into what happens when we ask e.g. python to print a hello world for us. Almost every step is described - search for the binary, process fork, dynamic linking, etc. They also describe the tools you can use to inspect all these things.
#linux #os
#linux #os
Check out this story about how John Carmack has achieved smooth scrolling and effective tile redrawing for Commander Keen.
#gamedev #history
#gamedev #history
Protecting gradle builds from supply-chain attacks. How to validate dependencies, their source, and how to check the gradle wrapper itself.
#gradle #build #cybersec
#gradle #build #cybersec
My man has implemented a toy JVM in Rust. Here you'll find a series of posts with details on .class files, bytecode and other aspects of his rjvm thingy.
#java #jvm #rust
#java #jvm #rust
Yet another creative attack. This time the target is laptop keyboard. Keystroke sound is recorded using either a phone lying nearby or during a video call, then a neural net processes them, and voila.
#cybersec #keyboard #sound
#cybersec #keyboard #sound
Offtop indeed, but this post is quite something. One undergrad student faced many difficulties and complications while trying to conduct an experiment to check some known germanium properties. According to him, these properties turned out to be a big lie. He described the difficulties, method, results, and regrets in the post.
#physics #science
#physics #science
