It feels like every single web service wants to use OAuth to get user data, and for good reason too. The alternatives include requiring users to create access tokens manually (yikes) and asking users to input their usernames/passwords to impersonate them (giga yikes). At least with OAuth, users get to see a pretty screen with a big “Approve” button.| preyneyv’s blog
Introduction In this post, I will share my experience on learning and playing with Extended Berkeley Packet Filter (eBPF). It's a very cool...| blog.fponzi.me
Any network device, be it a transit router or a host, usually has multiple IP addresses assigned to its interfaces. One of the first things we learn as network engineers is how to determine which IP address is used for the locally-sourced traffic. However, the default scenario can be changed in a couple of different ways and this post is a brief documentation of the available options. The Default Scenario Whenever a local application decides to connect to a remote network endpoint, it creates...| networkop
The role of a software developer often gets distilled down to a singular activity: coding. While coding is undeniably the heartbeat of the profession,| Vadim Kravcenko