The Plasmo Framework is a battery-packed browser extension SDK made by hackers for hackers. Build your product and stop worrying about config files and the odd peculiarities of building browser extensions.
#typescript #ts #js #chrome #browser #extension
#typescript #ts #js #chrome #browser #extension
โค1๐1๐ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
Features:
- Peer-to-Peer Mesh Networks
- Kubernetes and Multi-Cloud Enablement
- Remote Site Access via Gateway
- OAuth and Private DNS Features
- Fine-grained access controls
- Support for Linux, Mac, Windows, FreeBSD, iPhone, and Android
#kubernetes #golang #security #openvpn #cloud #networking #mesh #network #vpn #k8s #wireguard #devsecops #netmaker
Features:
- Peer-to-Peer Mesh Networks
- Kubernetes and Multi-Cloud Enablement
- Remote Site Access via Gateway
- OAuth and Private DNS Features
- Fine-grained access controls
- Support for Linux, Mac, Windows, FreeBSD, iPhone, and Android
#kubernetes #golang #security #openvpn #cloud #networking #mesh #network #vpn #k8s #wireguard #devsecops #netmaker
๐2โค1๐ฅ1
Firezone is a self-managed WireGuardยฎ-based VPN server and Linux firewall designed for simplicity and security.
Features:
- Fast: Uses WireGuardยฎ to be 3-4 times faster than OpenVPN.
- No dependencies: All dependencies are bundled thanks to Chef Omnibus.
- Simple: Takes minutes to set up. Manage via a simple CLI.
- Secure: Runs unprivileged. HTTPS enforced. Encrypted cookies.
- Firewall included: Uses Linux nftables to block unwanted egress traffic.
#security #cloud #networking #network #firewall #vpn #wireguard #devsecops
Features:
- Fast: Uses WireGuardยฎ to be 3-4 times faster than OpenVPN.
- No dependencies: All dependencies are bundled thanks to Chef Omnibus.
- Simple: Takes minutes to set up. Manage via a simple CLI.
- Secure: Runs unprivileged. HTTPS enforced. Encrypted cookies.
- Firewall included: Uses Linux nftables to block unwanted egress traffic.
#security #cloud #networking #network #firewall #vpn #wireguard #devsecops
๐2โค1๐ฅ1
Rust Cookbook.
This Rust Cookbook is a collection of simple examples that demonstrate good practices to accomplish common programming tasks, using the crates of the Rust ecosystem.
#rust #book #examples #learning #programming
This Rust Cookbook is a collection of simple examples that demonstrate good practices to accomplish common programming tasks, using the crates of the Rust ecosystem.
#rust #book #examples #learning #programming
๐2โค1๐ฅ1
I'm disabling comments. Use reactions to show what you like/dislike.
๐9โค8๐4๐ฅ1๐1
You can find link to the chat in the profile description.
๐คฏ3๐1๐1
What is globalThis, and why should you start using it?
The JavaScript language is increasingly used in a wide variety of environments. In addition to the web browser, which is the most common type of host environment for JavaScript, you can run JavaScript programs in servers, smartphones, and even robotic hardware.
Each environment has its own object model and provides a different syntax to access the global object. In the web browser, for example, the global object is accessible via
These different ways of referencing the global object have made it tough to write a portable JavaScript code that works in multiple environments. Fortunately, thereโs a proposal in the works that aims to fix this issue by introducing a standard property called
#js #globalThis #article
The JavaScript language is increasingly used in a wide variety of environments. In addition to the web browser, which is the most common type of host environment for JavaScript, you can run JavaScript programs in servers, smartphones, and even robotic hardware.
Each environment has its own object model and provides a different syntax to access the global object. In the web browser, for example, the global object is accessible via
window, self, or frames. In Node.js, however, these properties donโt exist, and you must use global instead. In Web Workers, only self is available.These different ways of referencing the global object have made it tough to write a portable JavaScript code that works in multiple environments. Fortunately, thereโs a proposal in the works that aims to fix this issue by introducing a standard property called
globalThis that will be available in all environments.#js #globalThis #article
๐ค4๐ฅ1๐1
Casbin is a powerful and efficient open-source access control library for Golang projects. It provides support for enforcing authorization based on various access control models.
#go #golang #auth #acl #rbac #abac #restful #middlewares
#go #golang #auth #acl #rbac #abac #restful #middlewares
โค1๐1๐ฅ1
Cool channel name isn't?
Anonymous Poll
48%
Yes, It is!
18%
For sure!
8%
I'm your fan, bro
26%
No (and also I suck)
๐ฅ9๐5๐1
Binary Tree via @gif
GIF
But the ones who chose "No", the FBI coming for ya soon.
๐ฅ4๐2โค1๐1
Now that I've got your attention. It's time to read about metaclasses.
Python Metaclasses.
The term metaprogramming refers to the potential for a program to have knowledge of or manipulate itself. Python supports a form of metaprogramming for classes called metaclasses.
Metaclasses are an esoteric OOP concept, lurking behind virtually all Python code. You are using them whether you are aware of it or not. For the most part, you donโt need to be aware of it. Most Python programmers rarely, if ever, have to think about metaclasses.
#python #metaclasses #metaprogramming #realpython #article
Python Metaclasses.
The term metaprogramming refers to the potential for a program to have knowledge of or manipulate itself. Python supports a form of metaprogramming for classes called metaclasses.
Metaclasses are an esoteric OOP concept, lurking behind virtually all Python code. You are using them whether you are aware of it or not. For the most part, you donโt need to be aware of it. Most Python programmers rarely, if ever, have to think about metaclasses.
#python #metaclasses #metaprogramming #realpython #article
๐3โค1๐ฅ1
Security and Privacy Guide
This guide is a collection of techniques for improving the security and privacy of a modern Apple Macintosh computer ("MacBook") running a recent version of macOS (formerly known as "OS X").
This guide is targeted to power users who wish to adopt enterprise-standard security, but is also suitable for novice users with an interest in improving their privacy and security on a Mac.
A system is only as secure as its administrator is capable of making it. There is no one single technology, software, nor technique to guarantee perfect computer security; a modern operating system and computer is very complex, and requires numerous incremental changes to meaningfully improve one's security and privacy posture.
This guide is provided on an 'as is' basis without any warranties of any kind. Only you are responsible if you break anything or get in any sort of trouble by following this guide.
#macos #security #apple #privacy #github #encryption #protection
This guide is a collection of techniques for improving the security and privacy of a modern Apple Macintosh computer ("MacBook") running a recent version of macOS (formerly known as "OS X").
This guide is targeted to power users who wish to adopt enterprise-standard security, but is also suitable for novice users with an interest in improving their privacy and security on a Mac.
A system is only as secure as its administrator is capable of making it. There is no one single technology, software, nor technique to guarantee perfect computer security; a modern operating system and computer is very complex, and requires numerous incremental changes to meaningfully improve one's security and privacy posture.
This guide is provided on an 'as is' basis without any warranties of any kind. Only you are responsible if you break anything or get in any sort of trouble by following this guide.
#macos #security #apple #privacy #github #encryption #protection
๐ฅ3๐2๐1
Refactoring.Guru makes it easy for you to discover everything you need to know about refactoring, design patterns, SOLID principles, and other smart programming topics.
This site shows you the big picture, how all these subjects intersect, work together, and are still relevant. I donโt pretend to be the inventor of these conceptsโmost of them were invented by others during the past 20 years. But I think that the connection between refactoring, patterns and general programming principles still remains a mystery for the majority of programmers. This is the problem I would like to solve here.
P.S Not an ad. I really enjoy this website.
#design #patterns #solid
This site shows you the big picture, how all these subjects intersect, work together, and are still relevant. I donโt pretend to be the inventor of these conceptsโmost of them were invented by others during the past 20 years. But I think that the connection between refactoring, patterns and general programming principles still remains a mystery for the majority of programmers. This is the problem I would like to solve here.
P.S Not an ad. I really enjoy this website.
#design #patterns #solid
๐5๐3โค1
Personal Security Checklist is a curated checklist of 300+ tips for protecting digital security and privacy in 2022.
#article #github #privacy #security #checklist
#article #github #privacy #security #checklist
โค3๐2๐ฅ1
NGINXConfig is the easiest way to configure a performant, secure, and stable NGINX server.
Features: HTTPS, HTTP/2, IPv6, certbot, HSTS, security headers, SSL profiles, OCSP resolvers, caching, gzip, brotli, fallback routing, reverse proxy, www/non-www redirect, CDN, PHP (TCP/socket, WordPress, Drupal, Magento, Joomla), Node.js support, Python (Django) server, etc.
#nginx #config #https #secure #stable #server #settings #python #django #node
Features: HTTPS, HTTP/2, IPv6, certbot, HSTS, security headers, SSL profiles, OCSP resolvers, caching, gzip, brotli, fallback routing, reverse proxy, www/non-www redirect, CDN, PHP (TCP/socket, WordPress, Drupal, Magento, Joomla), Node.js support, Python (Django) server, etc.
#nginx #config #https #secure #stable #server #settings #python #django #node
โค1๐1๐ฅ1
โค1๐1๐ฅ1
Myths about /dev/urandom.
There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false.
#security #random #urandom #random
There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false.
#security #random #urandom #random
โค1๐1๐ฅ1
Binary Tree
Myths about /dev/urandom. There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false. #security #random #urandom #random
These myths are not like the ones about the Theseus vs. Minotaur, but the article is quite interesting anyway.
๐2๐ฅ1๐1