Explore >> Select a destination


You are here

www.sysdig.com
| | blog.talosintelligence.com
5.0 parsecs away

Travel
| | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs.
| | cocomelonc.github.io
4.2 parsecs away

Travel
| | [AI summary] The post explains reverse shell techniques in cybersecurity, detailing how attackers use them to gain remote control over a target system by connecting back to their machine, with examples in various programming languages and tools like netcat.
| | thorstenball.com
5.4 parsecs away

Travel
| | [AI summary] The article explains how Unicorn, a web server, leverages Unix system calls and concepts like fork, pipe, and signal handling to efficiently manage web requests. It highlights features such as hot reloading, zero downtime deployments, and worker process scaling using signals. The author emphasizes that these capabilities are not magic but a result of understanding and utilizing Unix's low-level mechanisms. The article also discusses the importance of knowing system-level details for debugging, architectural decisions, and deeper understanding of how software operates on the underlying system.
| | hiltmon.com
19.7 parsecs away

Travel
| [AI summary] The post discusses increasing the file descriptor ulimit on macOS to prevent resource starvation in development environments, providing a script to adjust system limits permanently.