Cybercrooks increasingly are anonymizing their malicious traffic by routing it through residential broadband and wireless data connections. Most often, those connections are hacked computers, mobile phones, or home routers. But this is the story of a sprawling "bulletproof residential VPN"…
A Deep Dive Into the Residential Proxy Service ‘911’
For the past seven years, an online service known as 911 has sold access to hundreds of thousands of Microsoft Windows computers daily, allowing customers to route malicious traffic through PCs in virtually any country or city around the globe…
What I Wish Someone Would Have Told Me About Using Rabbitmq Before It Was Too Late
My watch is buzzing and in my pre-dawn stupor I cannot decipher if this is an alarm or a phone call. The time is 4:45 AM. I pull it together to realize it’s a call from a number I do not know - never a good sign. I answer and it is a coworker - my peer who runs our support team that is engaged in nearly all production issues for our customers. “Hi Ryan. Sorry to wake you, I know it’s early. Our biggest customer is reporting their requests are taking over two hours to return results. We think it’s because of our messaging system but we aren’t sure where to go from here. We need your help. Please join our call.” A few moments later my watch buzzed again as my morning alarm sounded. Today, this morning will not be for a workout.
Writing your own service discovery client for Apache APISIX
API Gateways in general, and Apache APISIX in particular, provide a single entry point into one’s information system. This architecture allows for managing load balancing and failover over similar nodes. For example, here’s how you can create a route balanced over two nodes in Apache APISIX: curl http://localhost:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -i -d '{ 'uri': '/*', 'upstream': { 'type': 'roundrobin', 'nodes': { '
Ask Slashdot: Does WebAssembly Increase Your Web Browser's Attack Surface? - Slashdot
Steve Springett is a conscientious senior security architect. And in 2018, he published an essay on GitHub arguing that from a security engineer's perspective, WebAssembly "increases the attack surface of any browser that supports it."
Springett wrote that WebAssembly modules are sent in (unsigne...
Filtering numbers faster with SVE on Graviton 3 processors
Processors come, roughly, in two large families x64 processors from Intel and AMD, and ARM processors from Apple, Samsung, and many other vendors. For a long time, ARM processors occupied mostly the market of embedded processors (the computer running your fridge at home) with the ‘big processors’ being almost exclusively the domain of x64 processors. … Continue reading Filtering numbers faster with SVE on Graviton 3 processors
Production postmortem: Your math is wrong, recursion doesn’t work this way
We got a call from a customer, a pretty serious one. RavenDB is used to compute billing charges for customers. The problem was that in one of their instances...
As part of my new job, I’m learning a lot more about the mysteries of the Domain Name System than any mortal should know I thought possible. The humble unix dig command allows you to query al…
SREs face multiple challenges while their platform becomes available in different locations on the globe. One step in overcoming them is building a solid monitoring system to enable that.