Binary Tree
728 subscribers
722 photos
2 videos
1 file
916 links
This is a channel about Open Source, software development, and IT in general.
Download Telegram
Firezone is a self-managed WireGuardยฎ-based VPN server and Linux firewall designed for simplicity and security.

Features:

- Fast: Uses WireGuardยฎ to be 3-4 times faster than OpenVPN.
- No dependencies: All dependencies are bundled thanks to Chef Omnibus.
- Simple: Takes minutes to set up. Manage via a simple CLI.
- Secure: Runs unprivileged. HTTPS enforced. Encrypted cookies.
- Firewall included: Uses Linux nftables to block unwanted egress traffic.

#security #cloud #networking #network #firewall #vpn #wireguard #devsecops
๐Ÿ‘2โค1๐Ÿ”ฅ1
Rust Cookbook.

This Rust Cookbook is a collection of simple examples that demonstrate good practices to accomplish common programming tasks, using the crates of the Rust ecosystem.

#rust #book #examples #learning #programming
๐Ÿ‘2โค1๐Ÿ”ฅ1
I'm disabling comments. Use reactions to show what you like/dislike.
๐Ÿ‘9โค8๐Ÿ‘Ž4๐Ÿ”ฅ1๐Ÿ‘1
You can find link to the chat in the profile description.
๐Ÿคฏ3๐Ÿ‘1๐Ÿ‘Ž1
What is globalThis, and why should you start using it?

The JavaScript language is increasingly used in a wide variety of environments. In addition to the web browser, which is the most common type of host environment for JavaScript, you can run JavaScript programs in servers, smartphones, and even robotic hardware.

Each environment has its own object model and provides a different syntax to access the global object. In the web browser, for example, the global object is accessible via window, self, or frames. In Node.js, however, these properties donโ€™t exist, and you must use global instead. In Web Workers, only self is available.

These different ways of referencing the global object have made it tough to write a portable JavaScript code that works in multiple environments. Fortunately, thereโ€™s a proposal in the works that aims to fix this issue by introducing a standard property called globalThis that will be available in all environments.

#js #globalThis #article
๐Ÿค”4๐Ÿ”ฅ1๐Ÿ‘1
Hammer is a rate-limiter for Elixir, with pluggable storage backends.

#elixir #ratelimit #phoenix
โค1๐Ÿ‘1๐Ÿ”ฅ1
Fyrox is a feature-rich, production-ready, general purpose 2D/3D game engine written in Rust with a scene editor.

#rust #game #engine #2d #3d
๐Ÿค”2๐Ÿ”ฅ1๐Ÿ‘1
Casbin is a powerful and efficient open-source access control library for Golang projects. It provides support for enforcing authorization based on various access control models.

#go #golang #auth #acl #rbac #abac #restful #middlewares
โค1๐Ÿ‘1๐Ÿ”ฅ1
๐Ÿ”ฅ9๐Ÿ˜5๐Ÿ‘1
Binary Tree via @gif
GIF
But the ones who chose "No", the FBI coming for ya soon.
๐Ÿ”ฅ4๐ŸŽ‰2โค1๐Ÿ‘Ž1
Now that I've got your attention. It's time to read about metaclasses.

Python Metaclasses.

The term metaprogramming refers to the potential for a program to have knowledge of or manipulate itself. Python supports a form of metaprogramming for classes called metaclasses.

Metaclasses are an esoteric OOP concept, lurking behind virtually all Python code. You are using them whether you are aware of it or not. For the most part, you donโ€™t need to be aware of it. Most Python programmers rarely, if ever, have to think about metaclasses.

#python #metaclasses #metaprogramming #realpython #article
๐Ÿ‘3โค1๐Ÿ”ฅ1
Security and Privacy Guide

This guide is a collection of techniques for improving the security and privacy of a modern Apple Macintosh computer ("MacBook") running a recent version of macOS (formerly known as "OS X").

This guide is targeted to power users who wish to adopt enterprise-standard security, but is also suitable for novice users with an interest in improving their privacy and security on a Mac.

A system is only as secure as its administrator is capable of making it. There is no one single technology, software, nor technique to guarantee perfect computer security; a modern operating system and computer is very complex, and requires numerous incremental changes to meaningfully improve one's security and privacy posture.

This guide is provided on an 'as is' basis without any warranties of any kind. Only you are responsible if you break anything or get in any sort of trouble by following this guide.

#macos #security #apple #privacy #github #encryption #protection
๐Ÿ”ฅ3๐Ÿ‘2๐Ÿ‘1
Refactoring.Guru makes it easy for you to discover everything you need to know about refactoring, design patterns, SOLID principles, and other smart programming topics.

This site shows you the big picture, how all these subjects intersect, work together, and are still relevant. I donโ€™t pretend to be the inventor of these conceptsโ€”most of them were invented by others during the past 20 years. But I think that the connection between refactoring, patterns and general programming principles still remains a mystery for the majority of programmers. This is the problem I would like to solve here.

P.S Not an ad. I really enjoy this website.

#design #patterns #solid
๐Ÿ‘5๐Ÿ‘3โค1
Personal Security Checklist is a curated checklist of 300+ tips for protecting digital security and privacy in 2022.

#article #github #privacy #security #checklist
โค3๐Ÿ‘2๐Ÿ”ฅ1
NGINXConfig is the easiest way to configure a performant, secure, and stable NGINX server.

Features: HTTPS, HTTP/2, IPv6, certbot, HSTS, security headers, SSL profiles, OCSP resolvers, caching, gzip, brotli, fallback routing, reverse proxy, www/non-www redirect, CDN, PHP (TCP/socket, WordPress, Drupal, Magento, Joomla), Node.js support, Python (Django) server, etc.

#nginx #config #https #secure #stable #server #settings #python #django #node
โค1๐Ÿ‘1๐Ÿ”ฅ1
I'm back on Twitter. Let's follow each other!

Twitter: https://twitter.com/likid_geimfari
โค1๐Ÿ‘1๐Ÿ”ฅ1
Myths about /dev/urandom.

There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false.

#security #random #urandom #random
โค1๐Ÿ‘1๐Ÿ”ฅ1
Binary Tree
Myths about /dev/urandom. There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false. #security #random #urandom #random
These myths are not like the ones about the Theseus vs. Minotaur, but the article is quite interesting anyway.
๐Ÿ˜2๐Ÿ”ฅ1๐Ÿ‘1
Pyrogram is a modern, elegant and asynchronous MTProto API framework. It enables you to easily interact with the main Telegram API through a user account (custom client) or a bot identity (bot API alternative) using Python.

Key Features

- Ready: Install Pyrogram with pip and start building your applications right away.
- Easy: Makes the Telegram API simple and intuitive, while still allowing advanced usages.
- Elegant: Low-level details are abstracted and re-presented in a more convenient way.
- Fast: Boosted up by TgCrypto, a high-performance cryptography library written in C.
- Type-hinted: Types and methods are all type-hinted, enabling excellent editor support.
- Async: Fully asynchronous (also usable synchronously if wanted, for convenience).
- Powerful: Full access to Telegram's API to execute any official client action and more.

#python #async #telegram #api #mtproto #framework #bots #typed #fast #elegant #asyncio
๐Ÿ”ฅ6โค1๐Ÿ‘1
All in One Hacking tool For Hackers.

Menu:

โ€” Anonymously Hiding Tools
โ€” Information gathering tools
โ€” Wordlist Generator
โ€” Wireless attack tools
โ€” SQL Injection Tools
โ€” Phishing attack tools
โ€” Web Attack tools
โ€” Post exploitation tools
โ€” Forensic tools
โ€” Payload creation tools
โ€” Exploit framework
โ€” Reverse engineering tools
โ€” DDOS Attack Tools
โ€” Remote Administrator Tools (RAT)
โ€” XSS Attack Tools
โ€” Steganograhy tools

#hacking #python #tools #ddos #sqlinjection #xss #csrf #attack #besthackingtool
โค4๐Ÿ‘2๐Ÿ‘Ž1๐Ÿ”ฅ1