This article talks about what web scraping is, its basic concepts, and its history. It also discusses common use cases where web scraping is used.| www.scrapingbee.com
Vault Enterprise supports Sentinel to provide a rich set of access control functionality. This tutorial walks through the creation and use of role governing policies (RGPs) and endpoint governing policies (EGPs).| Enforce access control with Sentinel policies | Vault | HashiCorp Developer
This post discusses how to efficiently parse the TLS response and form claims about it while preserving the privacy of sensitive data within the response.| Chainlink Blog
Folders in the Bitwarden password manager organize your Personal Vault by gathering together login credentials, cards, identities, and secure notes.| Bitwarden
Install| docs.vespa.ai
Fetch data from ConfigMaps, the Kubernetes API server, other cluster services, and image registries for use in Kyverno policies.| Kyverno
Background I recently had a bit of impromptu disaster recovery, and it gave me a hunger for more! More downtime! More kubernetes manifest! More DNS! Ahhhh! The plan was really simple. I love dedica...| fasterthanli.me
Background im-promp-tu (im-ˈpräm(p)-(ˌ)tü) made, done, or formed on or as if on the spur of the moment: improvised composed or uttered without previous preparation: extemporaneous Merriam-Webste...| fasterthanli.me
AWS has a lot of great services, that is true. But sometimes integrations between them look more like a result of a hackathon project. One of those is the Access logs of the AWS Amplify websites. In this set of posts, I will show you, at first how you can quickly analyze the logs locally with some common tools, and later how you can set up a flow of exporting logs to S3, running SQL queries with Athena, and send automated emails with the daily reports.| www.outcoldman.com
Learn useful terminology and concepts for using the GitHub GraphQL API.| GitHub Docs
Use HCP Terraform's API-driven run workflow to enable external tools to upload Terraform configurations and trigger new runs.| The API-driven run workflow in HCP Terraform | Terraform | HashiCorp Developer
Elements - an open source, sidechain-capable blockchain platform.| elementsproject.org
Collaborative Infrastructure For Modern Software Teams| docs.spacelift.io
Introduction to xpath in the context of web-scraping. How to extract data from HTML documents using xpath, best practices and available tools.| ScrapFly Blog
上一篇文章《Web API 简介》的落脚点是 Web API 的体验。 Web API 作为许多软件的第一道门面,提升其体验的努力从来没有停止过。今天,围绕 Web API 的开发体验和使用体验,已经成长出一个庞大的软件生态。本文以常用的 Web API 开发工具和平台为切入点,介绍当前 Web API 的开发者基础设施。| 夜天之书
Application Programming Interface (API) 即应用程序接口。顾名思义,它是开发者访问应用程序的接口。 例如,你可以通过以下命令查询 GitHub 上特定代码仓库的元数据信息: 1curl https://api.github.com/repos/apache/pulsar GitHub 会返回以下信息: 12345678910111213141516{| 夜天之书
The objective Given the non-negative integer \$n\$, output the value of the hyperfactorial \$H(n)\$. You don't have to worry about outputs exceeding your language's integer limit. Background The| Code Golf Stack Exchange
Learn the technologies that support storage drivers.| Docker Documentation
In this tutorial, you will learn how to enable Enterprise features in an Elastic Kubernetes Service (EKS) cluster running Isovalent Enterprise for Cilium.| isovalent.com
Executables have been fascinating to me ever since I discovered, as a kid, that they were just files. If you renamed a .exe to something else, you could open it in notepad! And if you renamed somet...| fasterthanli.me
Has this ever happened to you ? You want to look at a JSON file in your terminal, so you pipe it into jq so you can look at it with colors and stuff. Cool bear's hot tip...| fasterthanli.me
What is observability? Improving an application's observability can be one of the most empowering endeavors as an engineer. Imagine tiptoeing across a messy child's room in the middle of the night with the goal of not stepping on a Lego. Now imagine ...| chris ramacciotti
Vault policies provide a declarative way to allow or deny access to certain paths and operations in Vault. Start with defining policies using HCL, attaching them to tokens, and then ensuring secure access controls function.| Access controls with Vault policies | Vault | HashiCorp Developer
Working with eBPF? Discover how bpftool can help you load, inspect, update your eBPF programs, maps, and more.| qmonnet.github.io
If you’re unfamiliar with the tool jq, it describes itself as the “sed for JSON”. It’s a powerful command line tool that lets you do complex parsing and manipulation of JSON documents and is extremely useful for testing APIs or analysing JSON datasets. One challenge with jq, however, is finding just the right filter. The query language that jq uses is not always obvious, so typically you’ll spend a bit of time getting it just right to select the data you need.| gpanders.com
It’s possible to use JQ to build JSON payloads as well as filter them. — can be read in 1 minute| til.codeinthehole.com
The Bitwarden command-line interface (CLI) is a powerful, fully-featured tool for accessing and managing your Vault.| Bitwarden
We’ve just released another open-source tool: pretender, a cross-platform tool to obtain a machine-in-the-middle position inside Windows networks in the spirit of Responder and mitm6. It implements local name resolution spoofing using the mDNS, …| RedTeam Pentesting - Blog
We recently released our first open-source project, monsoon. monsoon is a so-called command-line HTTP enumerator: A tool that iterates over a list of values, for example a word list or a range of integers, and sends one HTTP request per item towards …| RedTeam Pentesting - Blog
I’m writing code to back up my user data off a website that lets me see all of my info (including querying by time, account etc) but doesn’t have export features (officially). I am certain there’s an API behind the site that I just have to make sense of. Since the webapp is requesting data from the API when I click, we should be able to record the web traffic to explore the API.| jiby.tech
Previously: security engineer at Square, co-author of HackLang, put the 's' in https at Facebook. Maker of CTFs.| www.quaxio.com
The API documentation for the API.| replicate.com
Happy Holidays and a Happy New Year 2020 readers!| Jack Hacks
Learn how to parse a CSV file in Bash and avoid the common pitfalls. Includes examples using bash builtins and the awk command line.| Shell Tips!
How to modify configuration files in XML, JSON and INI formats without using sed| peteris.rocks
Last year I decided to take on the challenge of running just Linux. ... Thankfully, I don't really miss Windows 10 that much. There were some bumps along the road, but the overall results were positive and enjoyable. So, I thought I'd share my favorite software choices for my personal Linux workstation.| Quakkels.com
Using TensorFlow.js for Machine Learning on Node.js. Use MobileNet models for image classification and visual recognition on local image files.| jamesthom.as
Serverless debugging Node.js applications on IBM Cloud Functions (Apache OpenWhisk). Using Docker to connect Chrome Dev Tools and Visual Studio Code to remote debugging service.| jamesthom.as
Sleep Analysis| notes.abhinavsarkar.net
A few how-to guides on auditing 1Password team accounts.| codeinthehole.com
Another note-to-self on how to use JQ.| codeinthehole.com
This is really just a reference on how to combine JQ's select filters.| codeinthehole.com
Inlets Secure Tunnels From Dev to Cloud| docs.inlets.dev
自分が Homebrew でインストールしているすべてのツールを一覧にしていく連載.第3回.| blog.wtsnjp.com
Introduction The Challenge Using Kubernetes, running application workloads resiliently and reliably is easy, if the workload is stateless. Let's think of a file format converter micro service or a simple web app serving static content| Marc Brandner
Today, we'll be diving into The Movie Database with HTTPie, jq, and jid and learning how to navigate its API efficiently.| Navigating an API from the terminal – HTTPie blog
We created a universal Docker mod for Tailscale, which lets you slap Tailscale on the side of existing Docker containers from linuxserver.io. In this article, Xe explains how you can use this and why it's funny.| Tailscale Community
1 – Start by adding doc comments to your types. The starting point is adding a single short summary sentence as comment (using the ///) for each public type in your library or app. Feel free …| Rhonabwy
As I'm back in the job market, I figured it was time to clean up some of my site internals. I've learned a lot about a lot since I first built it and my scss in…| xavd.id
COVID-19 Charts for India on Terminal| notes.abhinavsarkar.net
Consul is a great utility to make running your microservice architecture very simple. Amongst other things, it provides Service Discovery, Health Checks, and Configuration. In this post, we are going to be looking at Configuration; not specifically how to read from Consul, but about how we put configuration data into Consul in the first place. The usual flow for an application using Consul for configuration is as follows: App Starts Fetches configuration from Consul Configures itself Register...| andydote.co.uk
I think Vault by Hashicorp is a great product - I particularly love how you can do dynamic secret generation (e.g for database connections). But how do you validate that the application requesting the secret is allowed to perform that action? How do you know it’s not someone or something impersonating your application? While musing this at an airport the other day, my colleague Patrik sent me a link to a StackOverflow post about this very question| andydote.co.uk
In this post, I am going to look at an increasingly important part of securing applications: Your supply chain. This includes every library, tool or service that you are using to build, run and monitor your service. When the log4shell vulnerability hit, it wasn’t just a matter of looking at the dependencies that your source code pulls in, but also at the infrastructure you’re using and the build pipeline. Have you had a look at the vulnerability reports of your dependencies lately?| beny23.github.io
json2tsv: a JSON to TAB-Separated Value converter| www.codemadness.org
The Svix CLI is one of the fastest ways to interact with our API during development.| Svix Blog
Developing and advocating Free and Open Source Software| 200ok.ch
February 20th, 2019| www.netmeister.org
A quick summary of the AWS EC2 resources needed to create an IPv6-enabled or dualstack instance.| www.netmeister.org