Firezone is a self-managed WireGuardยฎ-based VPN server and Linux firewall designed for simplicity and security.
Features:
- Fast: Uses WireGuardยฎ to be 3-4 times faster than OpenVPN.
- No dependencies: All dependencies are bundled thanks to Chef Omnibus.
- Simple: Takes minutes to set up. Manage via a simple CLI.
- Secure: Runs unprivileged. HTTPS enforced. Encrypted cookies.
- Firewall included: Uses Linux nftables to block unwanted egress traffic.
#security #cloud #networking #network #firewall #vpn #wireguard #devsecops
Features:
- Fast: Uses WireGuardยฎ to be 3-4 times faster than OpenVPN.
- No dependencies: All dependencies are bundled thanks to Chef Omnibus.
- Simple: Takes minutes to set up. Manage via a simple CLI.
- Secure: Runs unprivileged. HTTPS enforced. Encrypted cookies.
- Firewall included: Uses Linux nftables to block unwanted egress traffic.
#security #cloud #networking #network #firewall #vpn #wireguard #devsecops
๐2โค1๐ฅ1
Rust Cookbook.
This Rust Cookbook is a collection of simple examples that demonstrate good practices to accomplish common programming tasks, using the crates of the Rust ecosystem.
#rust #book #examples #learning #programming
This Rust Cookbook is a collection of simple examples that demonstrate good practices to accomplish common programming tasks, using the crates of the Rust ecosystem.
#rust #book #examples #learning #programming
๐2โค1๐ฅ1
I'm disabling comments. Use reactions to show what you like/dislike.
๐9โค8๐4๐ฅ1๐1
You can find link to the chat in the profile description.
๐คฏ3๐1๐1
What is globalThis, and why should you start using it?
The JavaScript language is increasingly used in a wide variety of environments. In addition to the web browser, which is the most common type of host environment for JavaScript, you can run JavaScript programs in servers, smartphones, and even robotic hardware.
Each environment has its own object model and provides a different syntax to access the global object. In the web browser, for example, the global object is accessible via
These different ways of referencing the global object have made it tough to write a portable JavaScript code that works in multiple environments. Fortunately, thereโs a proposal in the works that aims to fix this issue by introducing a standard property called
#js #globalThis #article
The JavaScript language is increasingly used in a wide variety of environments. In addition to the web browser, which is the most common type of host environment for JavaScript, you can run JavaScript programs in servers, smartphones, and even robotic hardware.
Each environment has its own object model and provides a different syntax to access the global object. In the web browser, for example, the global object is accessible via
window, self, or frames. In Node.js, however, these properties donโt exist, and you must use global instead. In Web Workers, only self is available.These different ways of referencing the global object have made it tough to write a portable JavaScript code that works in multiple environments. Fortunately, thereโs a proposal in the works that aims to fix this issue by introducing a standard property called
globalThis that will be available in all environments.#js #globalThis #article
๐ค4๐ฅ1๐1
Casbin is a powerful and efficient open-source access control library for Golang projects. It provides support for enforcing authorization based on various access control models.
#go #golang #auth #acl #rbac #abac #restful #middlewares
#go #golang #auth #acl #rbac #abac #restful #middlewares
โค1๐1๐ฅ1
Cool channel name isn't?
Anonymous Poll
48%
Yes, It is!
18%
For sure!
8%
I'm your fan, bro
26%
No (and also I suck)
๐ฅ9๐5๐1
Binary Tree via @gif
GIF
But the ones who chose "No", the FBI coming for ya soon.
๐ฅ4๐2โค1๐1
Now that I've got your attention. It's time to read about metaclasses.
Python Metaclasses.
The term metaprogramming refers to the potential for a program to have knowledge of or manipulate itself. Python supports a form of metaprogramming for classes called metaclasses.
Metaclasses are an esoteric OOP concept, lurking behind virtually all Python code. You are using them whether you are aware of it or not. For the most part, you donโt need to be aware of it. Most Python programmers rarely, if ever, have to think about metaclasses.
#python #metaclasses #metaprogramming #realpython #article
Python Metaclasses.
The term metaprogramming refers to the potential for a program to have knowledge of or manipulate itself. Python supports a form of metaprogramming for classes called metaclasses.
Metaclasses are an esoteric OOP concept, lurking behind virtually all Python code. You are using them whether you are aware of it or not. For the most part, you donโt need to be aware of it. Most Python programmers rarely, if ever, have to think about metaclasses.
#python #metaclasses #metaprogramming #realpython #article
๐3โค1๐ฅ1
Security and Privacy Guide
This guide is a collection of techniques for improving the security and privacy of a modern Apple Macintosh computer ("MacBook") running a recent version of macOS (formerly known as "OS X").
This guide is targeted to power users who wish to adopt enterprise-standard security, but is also suitable for novice users with an interest in improving their privacy and security on a Mac.
A system is only as secure as its administrator is capable of making it. There is no one single technology, software, nor technique to guarantee perfect computer security; a modern operating system and computer is very complex, and requires numerous incremental changes to meaningfully improve one's security and privacy posture.
This guide is provided on an 'as is' basis without any warranties of any kind. Only you are responsible if you break anything or get in any sort of trouble by following this guide.
#macos #security #apple #privacy #github #encryption #protection
This guide is a collection of techniques for improving the security and privacy of a modern Apple Macintosh computer ("MacBook") running a recent version of macOS (formerly known as "OS X").
This guide is targeted to power users who wish to adopt enterprise-standard security, but is also suitable for novice users with an interest in improving their privacy and security on a Mac.
A system is only as secure as its administrator is capable of making it. There is no one single technology, software, nor technique to guarantee perfect computer security; a modern operating system and computer is very complex, and requires numerous incremental changes to meaningfully improve one's security and privacy posture.
This guide is provided on an 'as is' basis without any warranties of any kind. Only you are responsible if you break anything or get in any sort of trouble by following this guide.
#macos #security #apple #privacy #github #encryption #protection
๐ฅ3๐2๐1
Refactoring.Guru makes it easy for you to discover everything you need to know about refactoring, design patterns, SOLID principles, and other smart programming topics.
This site shows you the big picture, how all these subjects intersect, work together, and are still relevant. I donโt pretend to be the inventor of these conceptsโmost of them were invented by others during the past 20 years. But I think that the connection between refactoring, patterns and general programming principles still remains a mystery for the majority of programmers. This is the problem I would like to solve here.
P.S Not an ad. I really enjoy this website.
#design #patterns #solid
This site shows you the big picture, how all these subjects intersect, work together, and are still relevant. I donโt pretend to be the inventor of these conceptsโmost of them were invented by others during the past 20 years. But I think that the connection between refactoring, patterns and general programming principles still remains a mystery for the majority of programmers. This is the problem I would like to solve here.
P.S Not an ad. I really enjoy this website.
#design #patterns #solid
๐5๐3โค1
Personal Security Checklist is a curated checklist of 300+ tips for protecting digital security and privacy in 2022.
#article #github #privacy #security #checklist
#article #github #privacy #security #checklist
โค3๐2๐ฅ1
NGINXConfig is the easiest way to configure a performant, secure, and stable NGINX server.
Features: HTTPS, HTTP/2, IPv6, certbot, HSTS, security headers, SSL profiles, OCSP resolvers, caching, gzip, brotli, fallback routing, reverse proxy, www/non-www redirect, CDN, PHP (TCP/socket, WordPress, Drupal, Magento, Joomla), Node.js support, Python (Django) server, etc.
#nginx #config #https #secure #stable #server #settings #python #django #node
Features: HTTPS, HTTP/2, IPv6, certbot, HSTS, security headers, SSL profiles, OCSP resolvers, caching, gzip, brotli, fallback routing, reverse proxy, www/non-www redirect, CDN, PHP (TCP/socket, WordPress, Drupal, Magento, Joomla), Node.js support, Python (Django) server, etc.
#nginx #config #https #secure #stable #server #settings #python #django #node
โค1๐1๐ฅ1
โค1๐1๐ฅ1
Myths about /dev/urandom.
There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false.
#security #random #urandom #random
There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false.
#security #random #urandom #random
โค1๐1๐ฅ1
Binary Tree
Myths about /dev/urandom. There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false. #security #random #urandom #random
These myths are not like the ones about the Theseus vs. Minotaur, but the article is quite interesting anyway.
๐2๐ฅ1๐1
Pyrogram is a modern, elegant and asynchronous MTProto API framework. It enables you to easily interact with the main Telegram API through a user account (custom client) or a bot identity (bot API alternative) using Python.
Key Features
- Ready: Install Pyrogram with pip and start building your applications right away.
- Easy: Makes the Telegram API simple and intuitive, while still allowing advanced usages.
- Elegant: Low-level details are abstracted and re-presented in a more convenient way.
- Fast: Boosted up by TgCrypto, a high-performance cryptography library written in C.
- Type-hinted: Types and methods are all type-hinted, enabling excellent editor support.
- Async: Fully asynchronous (also usable synchronously if wanted, for convenience).
- Powerful: Full access to Telegram's API to execute any official client action and more.
#python #async #telegram #api #mtproto #framework #bots #typed #fast #elegant #asyncio
Key Features
- Ready: Install Pyrogram with pip and start building your applications right away.
- Easy: Makes the Telegram API simple and intuitive, while still allowing advanced usages.
- Elegant: Low-level details are abstracted and re-presented in a more convenient way.
- Fast: Boosted up by TgCrypto, a high-performance cryptography library written in C.
- Type-hinted: Types and methods are all type-hinted, enabling excellent editor support.
- Async: Fully asynchronous (also usable synchronously if wanted, for convenience).
- Powerful: Full access to Telegram's API to execute any official client action and more.
#python #async #telegram #api #mtproto #framework #bots #typed #fast #elegant #asyncio
๐ฅ6โค1๐1
All in One Hacking tool For Hackers.
Menu:
โ Anonymously Hiding Tools
โ Information gathering tools
โ Wordlist Generator
โ Wireless attack tools
โ SQL Injection Tools
โ Phishing attack tools
โ Web Attack tools
โ Post exploitation tools
โ Forensic tools
โ Payload creation tools
โ Exploit framework
โ Reverse engineering tools
โ DDOS Attack Tools
โ Remote Administrator Tools (RAT)
โ XSS Attack Tools
โ Steganograhy tools
#hacking #python #tools #ddos #sqlinjection #xss #csrf #attack #besthackingtool
Menu:
โ Anonymously Hiding Tools
โ Information gathering tools
โ Wordlist Generator
โ Wireless attack tools
โ SQL Injection Tools
โ Phishing attack tools
โ Web Attack tools
โ Post exploitation tools
โ Forensic tools
โ Payload creation tools
โ Exploit framework
โ Reverse engineering tools
โ DDOS Attack Tools
โ Remote Administrator Tools (RAT)
โ XSS Attack Tools
โ Steganograhy tools
#hacking #python #tools #ddos #sqlinjection #xss #csrf #attack #besthackingtool
โค4๐2๐1๐ฅ1