ContentPosts from @ashishsen5455..
Story
@laura_garcia shared a post, 1 year, 3 months ago
Software Developer, RELIANOID

URL hashes

Curious about URL hashes and their role in web development? Our latest article breaks down everything you need to know about this powerful tool for in-page navigation, single-page applications, dynamic content loading, and more. Learn how to leverage URL hashes to enhance user experience and state m..

Knowledge base_Understanding URL-hash _RELIANOID
Story
@madnanb647 shared a post, 1 year, 3 months ago

System Design Made Easy: A Step-by-Step Guide for 2024

System Design Made Easy: A Step-by-Step Guide for 2024

 Activity
@ryanc added a new tool Resourcely , 1 year, 3 months ago.
Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

Live Migrating Production Clusters From Calico to Cilium

Kubernetes clusters can run on different CNIs, and switching between them is complex. Migrating from Calico to Cilium, for example, involves deploying Cilium alongside Calico, testing connectivity, and gradually switching workloads to use Cilium. This method ensures minimal downtime and service disr.. read more  

Live Migrating Production Clusters From Calico to Cilium
Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

Is Cloudflare overcharging us for their images service?

The author investigated unexpectedly high charges from Cloudflare Images forEphemeraSearch, involving complex billing cycles and credits. They discovered that changing image storage capacity triggers immediate charges, with credits applied the following month, leading to temporary overbilling. Despi.. read more  

Is Cloudflare overcharging us for their images service?
Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

Revealing the Inner Structure of AWS Session Tokens

Researchers have successfullyreverse-engineeredAWS Session Tokens, revealing their internal structure and cryptographic methods. They created open-source tools for analyzing and modifying these tokens and tested their resilience against forging attacks, finding them robust. Additionally, they identi.. read more  

Revealing the Inner Structure of AWS Session Tokens
Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

Kubernetes 1.31 - What’s new?

Kubernetes 1.31 introduces several major enhancements, including AppArmor support for defining security profiles at the container or pod level. Another notable change is the removal of all in-tree integrations with cloud providers, pushing Kubernetes towards vendor neutrality. Additionally, improvem.. read more  

Kubernetes 1.31 - What’s new?
Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

CVE-2024-5535: `SSL_select_next_proto` buffer overread 

CVE-2024-5535 is a bug in OpenSSL that has been present since 2011, allowing the leakage of up to 255 bytes of the client's heap data to the server when theSSL_select_next_protofunction is called with a client buffer that is not a valid list of protocols. This bug affects OpenSSL, BoringSSL, Node.js.. read more  

Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

The DevOps Guide to SaaS Security

In February 2023, LastPass experienced a security breach involving a targeted attack on a DevOps engineer’s access to the corporate vault. This incident highlights the critical importance of robust access controls and security practices in SaaS environments, where customers must secure applications,.. read more  

The DevOps Guide to SaaS Security
Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

Making Damn Vulnerable Web Application (DVWA) almost unhackable with Cilium and Tetragon

Cilium and Tetragon are two powerful tools combined to defend the Damn Vulnerable Web Application (DVWA) against attacks by harnessing the power of eBPF technology in the Kubernetes universe. By utilizing Cilium for process, file, HTTP, and network-based defenses alongside Tetragon for security obse.. read more Â