Monthly Shaarli

All links of one month in a single page.

May, 2016

SSL/TLS and PKI Timeline
Web browser entropy
Is your site IPv6 ready?
Clacks directory
OWASP Broken Web Applications Project - OWASP
Almir
fogproject.org
Glances by nicolargo

Glances is a cross-platform system monitoring tool written in Python.

ZshWiki
Am I wasting my time organizing email? A study of email refinding
Consequences of Erudite Vernacular Utilized Irrespective of Necessity: Problems with Using Long Words Needlessly
Bash Redirections Cheat Sheet - good coders code, great reuse
gource - software version control visualization - Google Project Hosting
HTTP Archive Viewer 2.0.15
glTail.rb - realtime logfile visualization
How to find MySQL queries worth optimizing ?
Xibo - Digital Signage
Unspecific.com
Blacklist Check
VimGolf - real Vim ninjas count every keystroke!
The Mathematics of RAID-6
Getting MySQL Status Values With mysqlreport | HowtoForge - Linux Howtos and Tutorials
How to do Painless MySQL Server Backups with AutoMySQLBackup | Linux.com
Univariate Distribution Relationship Chart
Fundamental: Stress-Strain Curves In Web Engineering
Why you should not use .htaccess (AllowOverride All) in production – Developer, author, musician, global domination theoretician
Mininet: An Instant Virtual Network on your Laptop (or other PC) - Mininet
Stop Magento Permissions Errors ... Permanently | Sonassi Makes Magento Ecommerce Websites
What every web developer must know about URL encoding
The true power of regular expression
Most data isn’t “big,” and businesses are wasting money pretending it is – Quartz
An eBook pricing model that resulted in $100,000 in sales
The Physics Behind Traffic Jams
Brendan's blog » The USE Method
Setting up a basic Linux ZFS instance
sysadvent: Day 13 - Configuration Management as Legos
Simple Puppet Module Structure Redux | R.I.Pienaar
The Vitamin Myth
SSH Two-factor Auth with Google Authenticator
Creating a Puppet-ready Image
Preparing Linux Template VMs
www.sciencebasedmedicine.org
Working hard for the sake of working hard is laziness
SensorTower - Mobile SEO and Keyword Optimization for iPhone and iPad iPhone & iPad iTunes App Store Keyword Tracking
Help! Linux ate my RAM!
Apple Cores are a Myth
Motherfucking Website
A Proper Server Naming Scheme
explainshell.com - match command-line arguments to their help text
Blocking Unwanted Connections with a Hosts File
Cynefin - Wikipedia, the free encyclopedia
Successful People Start Before They're Ready
Bash Pitfalls
Turn any application that uses STDIN/STDOUT into a WebSocket server
Re: [PATCH] oom_pardon, aka don't kill my xlock [LWN.net]
Optimizing NGINX TLS Time To First Byte (TTTFB) - igvita.com
Using Computer Modern on the web
Storing ASCII art in the DNS
NSA-O-Matic
blog dds: 2013.12.11 - The Birth of Standard Error
DBA 101: Sometimes forgotten functionality in the MySQL client
UDP-based Amplification Attacks | US-CERT
The C10K problem
Ancient Linux servers: The blighted slum houses of the Internet | Ars Technica
Heartbleed should bleed X.509 to death
Why is git pull considered harmful?
LaTeX Resume
Linux IO Stack Diagram
Chris Siebenmann: Static sites are stable sites
Linux.fm
Tsung
Grafana – feature rich Graphite dashboard replacement and graph editor
The utility of switching lanes when stuck in traffic
A Survey of the Localhost Proxying Landscape
Improving the security of your SSH private key files — Martin Kleppmann’s blog
Static Site Generators
Process Posterity: Morgan (Reece) Phillips @linuxpoetry
Lesser known DNS tools and BIND tricks (2012)
Your Life in Weeks
Alcohol as a social technology to check the trustworthiness of others
Warrant canary - Wikipedia, the free encyclopedia
How old are you getting? Let us explain it properly!
HTTP/1.1 just got a major update.
What was Alan Turing really like?
DNS Leak Tests
PFQ 3.0 is out!
42.zip (2004)
Multitasking Management in the Operating System Kernel
MySQL (InnoDB) clustered and non-clustered indexes
Big list of http static server one-liners
devstructure/blueprint
Daskeyboard 4 Professional - "The Thinnest Mechanical Keyboard in the World"
Q: What's wrong with this picture? A: Everything
TheDevShed
Moving away from Puppet: SaltStack or Ansible?
SSH Key Types
Fully Functional 1KB Hard Drive in Vanilla Minecraft
Why Do Nigerian Scammers Say They Are from Nigeria? (2012)
Traffic Ghost Hunting
Mining Bitcoin with pencil and paper: 0.67 hashes per day
What are some obscure but useful Vim commands
SSH with authentication key instead of password
How I Wrote and Sold My First Ebook (and how you can do it too)
SlideRule: A Searchable Catalog of Online Courses
A Pragmatic Guide to Getting Things Done
google/firing-range
Analyze your .zsh_history [OC]
Programming excuses API
List of Quick Look Plugins
PHP Install Statistics
SSH Security
FreshRSS: Ein weiterer Aggregator für die eigene Datenwolke
Sysadmin it-landscape
Images Kernels Explained Visually
mdp: A command-line based markdown presentation tool.
R Graph Catalog
sbase - suckless unix tools
Termui – Go terminal dashboard
No-www
Yes-www
jigish/slate · GitHub
Causal Consistency
Sysdig Container Visibility
Secure Secure Shell
Redis Performance Debugging
Sans Bullshit Sans
Open-SCAP
Hit That
Void
GNS3
Metrics 2.0
Cloudping
Without Systemd
Peak car
Be Kind
Bechdel Test
Hanlon's Razor
SSL again
speedof.me
Git Miner
Global DNS Tester
Why Not Use Port Knocking? (2012)
Dead Man Snitch
Strong SSL Security on nginx - Raymii.org
UNIX Shells
What one may find in robots.txt
Web Security Dojo
Two-Factor-Authentication with SSH
SSL certificate verification on PHP 5.6 | Rob Allen
Instantly run DNS, HTTP and Traceroute tests across the globe
library of emoticons
How to Fix “Site Is Using Outdated Security Settings” on Server
No one expects command execution
WATOBO – The Web Application Security Auditing Toolbox
emojitracker: realtime emoji use on twitter
Why did Netflix use NGINX and FreeBSD to build their own CDN? by Gleb Smirnoff - YouTube
Distributing files via DNS - Frederic Cambus
G-WAN Web Server
Linux Distributions Timeline
GitUp
Phoenix
command line interface for MySQL, MariaDB, and Percona
Become a MySQL DBA blog series - The Query Tuning Process | Severalnines
Nikola
KDebug for OS X and iOS
The Ultimate Oldschool PC Font Pack: Home
HTTP Security Report
Mozilla SSL Configuration Generator
The Tail End
Fileless JavaScript Reverse HTTP Shell Raw
Mitigating DDoS Attacks with NGINX and NGINX Plus - NGINX
Writing manual pages
Shodan
PHP Versions
securityheaders.io
41f8478faaf6c41b2b484e167b3dbb6a95674839 - chromium/src - Git at Google
Free Web Server Security Test
An Illustrated Guide to SSH Agent Forwarding
Clonezilla - About
How to set up user accounts on your web server – Capistrano, deployment, Linux, SSH, UNIX – Leonid Shevtsov
Best Practical
Dashrath Manjhi - Wikipedia, the free encyclopedia
plotting - xkcd-style graphs - Mathematica
Artificially intelligent game bots pass the Turing test on Turing's centenary
Stresslinux
Anatomy of a Solid-state Drive - ACM Queue
Linux TCP/IP Tuning for Scalability - Engine Yard Blog | Engine Yard Blog
Network Weathermap | See Everything - Current Release v0.97a
Information Radiators | Atlassian
Posix Threads Programming Tutorial
ICSI Netalyzr
Integrating Ubuntu 12.10 With Active Directory On Server 2008 ( Weekend Geekout ) | TechStaty : technical ecstasy
Apache Common Misconfigurations
Regexper
RFC 1178 - Choosing a name for your computer
Anatomy of the Linux virtual file system switch
A Tcpdump Tutorial and Primer | danielmiessler.com
List of cognitive biases - RationalWiki
http://selection.datavisualization.ch/
etsy/logster · GitHub
Debugex: A visual regex debugger
Gatling Project - Stress Tool
Being Suicidal: What it feels like to want to kill yourself
First 5 Minutes Troubleshooting A Server | devo.ps
Show HN: Global HTTP Latency Test
The CAP FAQ by henryr
Red Hat Enterprise Linux - Red Hat Customer Portal
Tobi's Blog » Blog Archiv » Festplattenzugriffe unter Linux (Ubuntu) minimieren
Where did all the HTTP referrers go?
Common shell script mistakes
Guest-based Performance Measurement | VMware Communities
It's the Latency, Stupid
Trouble-Maker
Designing Puppet – Roles and Profiles. - - Craig Dunn's Blog
The anti-virus age is over. | codeinsecurity
How YouPorn Uses Redis: SFW Edition
xkcd password strength
The History and Psychology of Clowns Being Scary | Arts
JMater best-practices
Food fadism: exposing the gluten myth
Plain Text Doesn't Exist
Git Cheatsheet
Working with XML using standard Unix tools
CSS px is an Angular Measurement
Why you Need Fencing
High-availability options for MySQL, October 2013 update
Blend Modes Explained
Everyday Postgres: Tuning a brand-new server (the 10-minute edition)
Lynis: Security and Hardening for Unix and Linux - Technical Auditing
Git team workflows: merge or rebase? | Atlassian Blogs
List of cognitive biases
QuickTip: Java Basics: Stack and Heap | c0nnexx10n : C0nnect1ng L1fe w1th Techn010gy
Journal of Universal Rejection (JofUR)
rtc xmpp jabber jitsi
Best paper awards at AAAI, ACL, CHI, CIKM, CVPR, FOCS, FSE, ICCV, ICML, ICSE, IJCAI, INFOCOM, KDD, MOBICOM, NSDI, OSDI, PLDI, PODS, S
NSA Product Generator
Colors
Broken by design: systemd
The Magic of strace - Chad Fowler
Using OpenSSH Certificate Authentication - neocri.me
The Egg
Parkinson's law of triviality - Wikipedia, the free encyclopedia
My heart is ok, but my eyes are bleeding
Boring Systems Build Badass Businesses
boycott systemd
Detect if your container is running under a hypervisor
Nginx Performance
Coping with the TCP TIME-WAIT state on busy Linux servers | Vincent Bernat
Signs you might be in survival mode - Elastic Team Leadership in Software - Elastic Leadership
stronger encryption for SSH keys - Information Security Stack Exchange
Was bleibt von NoSQL?
Top Open-Source Static Site Generators - StaticGen
xip.io : wildcard DNS for everyone
RSS: What Not Dying Looks Like
Linux Commands - A practical reference
Observium
Show HN: Hash your work and store it in a bank transfer for priority statement
Beautiful Docs
Cipherli.st – Strong copy-paste SSL configuration
Plain Text Offenders
Mystery signal from a helicopter
Favicon checker
ZFS: Read Me First
Understanding Linux CPU Load
SSL is Not About Encryption
It’s Still the Latency, Stupid (2007)
Understanding Virtual Memory (2004)
Hyperbole and a Half: Depression Part Two
Heavybit Industries
Graphic: Comparing iOS and Android Screen Sizes - Businessweek
Stormforger – a cloud-based Load Testing as a Service solution
Show HN: Vim Awesome – Vim plugins
Patoline: A modern digital typesetting system
httpry
Hack Back!
Hardening SSH
Math Box 2
Roll Your Own CDN
80's Sysadmin Warning Posters Look Like Dystopian Parodies
Get Paid to Write for DigitalOcean | DigitalOcean
Email History through RFCs
Vim blowfish encryption... or why you shouldn't roll your own crypto
A PDF that contains its own TeX source
My Philosophy on Alerting: Observations of a Site Reliability Engineer at Google
Developer setup on OS X Yosemite
We Are All Confident Idiots
Say No
How Not to Measure Computer System Performance
Multitun – Tunnel arbitrary traffic through an innocuous WebSocket
Want to have your server pwned? Easy: Run PHP
Most complex ASCII fluid - Honorable mention
RegViz
@corkami
@corkami
OWASP ZAP
Why is it so difficult to write valid “tar” commands from memory?
Screw motivation, what you need is discipline.
Rosetta Stone for Unix
Volvo Life Paint
DNS Viz
Keep a CHANGELOG
Server Room Seduction
The Calendar Arc Project
Deployment is UNIX
How Browsers Work
TLS-O-Matic
USB Killer
The sad State of Sysadmin in the Age of Containers
Java VM Options You Should Always Use in Production
Manually Testing SSL/TLS Weaknesses
P vs. NP and the Computational Complexity Zoo (2014) [video]
Mindless Accumulation
Loadtestertool.com
UDP and Me
Discovering Two Screens Aren’t Better Than One - NYTimes.com
Diffie-Hellman Key Exchange in Plain English
Are You Living in a Simulation?
Choosing a Linux Tracer (2015)
ParseMail
The Logjam Attack
A scalable TLS proxy
SVG Porn - A collection of svg logos for developers.
On Managing Developers
basemap.at – Verwaltungsgrundkarte Österreichs
How to Use ELK to Monitor Performance
LaTeX Symbols and Where to Find Them
PDF - Myths vs facts // Speaker Deck
The MySQL query cache: Worst enemy or best friend?
The Netflix Tech Blog: Java in Flames
Category:OWASP Application Security Verification Standard Project - OWASP
OWASP Security Knowledge Framework
Service Name and Transport Protocol Port Number Registry
FreeBSD Jails the hard way – Clint A. – Stuff I do
Joomla Test
Installing and Verifying Magento Community Edition (CE) and Enterprise Edition (EE)
/bin/bash based SSL/TLS tester: testssl.sh
Beats - Data Shippers for Elasticsearch
Why Percentiles Don’t Work the Way you Think
SRI Test
Why HTTP/2.0 does not seem interesting — Varnish version trunk documentation
host file
http://check-ciphers.com
/bin/bash based SSL/TLS tester: testssl.sh
IPv4/IPv6 subnet calculator and addressing planner
Last- und Stresstests: grundsätzliche Erwägungen und Tipps für den Einsatz | heise Developer
logstalgia - website access log visualization - Google Project Hosting
Sysprof - Statistical, system-wide Profiler for Linux
Jeffrey's Exif viewer
tikz pgf - Create xkcd style diagram in TeX - TeX - LaTeX
Zip bomb - Wikipedia, the free encyclopedia
My Collection of PHP Performance Benchmarks
What Is My IP Address? - ifconfig.me
GoAccess - Visual Web Log Analyzer
aidsql - A tool that will aid you when trying to find vulnerable spots in your site - Google Project Hosting
PDF Mailer - Department of Psychology - Florida State University
untitled
Virtualization With KVM On Ubuntu 12.10 | HowtoForge - Linux Howtos and Tutorials
Easy CLI JSON Formatting | Binary Sludge
d0x3d!
www.pixelbeat.org/scripts/ps_mem.py
The TTY demystified
PDF is still “better” - Tools of Change for Publishing
ftp://ftp.ripe.net/ripe/stats/membership/alloclist.txt
Linux terminal keylogger in userspace
Home - Browserscope
statsd: Simple daemon for easy stats aggregation
Digital Image Forensic Analyzer - imageforensic.com
typo3.lygie.de: Startseite
Performance Analysis Methodology | USENIX
Know your HTTP
Service Name and Transport Protocol Port Number Registry
Benchmarking Windows Guests on KVM:I/O performance « JRS Systems: the blog
System administrator leveling matrix
Getting The Hang Of IOPS v1.3 | Symantec Connect Community
Apache Bench and Gnuplot: you’re probably doing it wrong
SSH mit iptables schützen
Data Compression Explained
The Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Unicode and Character Sets (No Excuses!) - Joel on Software
Queueing in the Linux Network Stack
Brendan's blog » What the Mean Really Means
PentesterLab
Caching Tutrial
RFC 1178 - Choosing a name for your computer
First Few Milliseconds of HTTPS
Wounded QR code
Things Caches Do
Funkatron / Open Sourcing Mental Illness
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
Show HN: ifcfg.net
ESI Language Specification 1.0
http://www.freebsd.org/cgi/cvsweb.cgi/~checkout~/src/share/misc/bsd-family-tree?rev=HEAD
Apache Web Server Hardening
tony/tmuxp · GitHub
Stop monitoring whether or not your service is up! - Everything Sysadmin
Chris Siebenmann: sudo is not an auditing mechanism
List of eponymous laws - Wikipedia, the free encyclopedia
This Much Longer - A Morbid Motivation Tool
PHP Manual Masterpieces
LaTeX Templates » Maggi Memoir Thesis
42 Logical Fallacies
Hans - IP over ICMP
Optimizing servers - Making your servers fly
what the Dunning-Kruger effect is and isn’t | [citation needed]
Mind Map for Web Application audit : netsec
Your 60-Hour Work Week is Not a Badge of Honour | Jeff Archibald
Does your browser rejected revoked certificates?
evil.sh
Why your previous developer was terrible — Medium
MapReduce - Simple Introduction
Cryptography Explained in a Limerick
BetterCrypto⋅org
Goji: a web microframework for Go
Why roller coaster loops are inverted tear-drops and not circular
It's Adventure Time
The American Man's Scotch Pronunciation Guide
Show HN: packetbeat – Open Source application monitoring
A Comparison of Go Web Frameworks
Using strace and lsof
Hardening SSL in Nginx
How a German Soda Became Hackers' Fuel of Choice
More Linux Commands - A practical reference
UFTP - Encrypted UDP based FTP with multicast
Death Row – Last words of every inmate executed since 1982
Zsh/Bash startup files loading order (.bashrc, .zshrc etc.) | The Lumber Room
The Tyranny of the Hollerith Punched Card
Do not trust vmstat IOwait numbers
PFQ I/O
The Bro Network Security Monitor
Unix Recovery Legend (1986)
Strace, system calls and processes: where did fork go?
newsapps/beeswithmachineguns
Minimal explanation of the CAP theorem
Google Dorks : Backdoored c99 (Find Already Uploaded c99 Shells) - Hacking-Sec
What happens when you yell at your servers.
A definitive list of static site generators
Shellpic
Feel secure with SSL? Think again
HonSSH
FreeBSD Desktop
Science is not Democratic
Inside the world of legalised prostitution in Germany
RAID-Calculator
Check SSH Host Key
Insects and Entropy
The SELinux coloring book [pdf]
Be Awesome By Being Boring
What Does The Slash In Crontab(5) Actually Do?
Using knitr and pandoc to create reproducible scientific reports
Monitoring pfSense (2.1) logs using ELK (ElasticSearch, Logstash, Kibana)
Overconfidence in Network Perimeter Security - Unloadlocal Security Research
ZSH History Analysis
OmniFocus Perspective Icons
SSL Cipher Suite Details of Your Browser
ZFS: You should use mirror vdevs, not RAIDZ. | JRS Systems: the blog
FreeBSD Toolbox
Pico
http://people.freebsd.org/~markj/dtrace/
The Quest to Replace Passwords
Wie depressive Menschen denken
Practical discipline
OpenSSH Security
the button • /r/thebutton
bsdeploy
Decrypting TLS the Easy Way
WipEout (PSX) – Model Viewer
asciinema
Linux Debts and Out of Memory Killer
endoh1 Fluid Simulator
Tracebox - Middlebox Detection
Knowledge Argument - Mary's Room
HTTPsys
Unexpected Hanging Paradox
Onur Mutlu - Computer Architecture Resources
Why no SSL
Deprecating Non-Secure HTTP
FOAAS – Fuck Off As A Service
random.org
Bolt CMS
What The Commit?
Boycott Docker
About HTTP Public Key Pinning
Actual Zero-Downtime with HAProxy
Tab Closed; Didn't Read
Taarof - Wikipedia, the free encyclopedia
GTmetrix
No one expect command execution!
Stephen Bourne: Early days of Unix and design of sh
Elasticsearch
IT Engineering Blogs
Calculate HTTP Response Time in Wireshark
More falsehoods programmers believe about time;...: @noahsussman: Infinite Undo
Client side certificate authentication
Collection of postmortems
Performance Optimization, SIMD and Cache - YouTube
RegexPlay - Test your regex skills!
Debian not booting: ALERT /dev/disk/by-uuid does not exist
Recurrent Neural Network Handwriting Generation Demo
Deprecating Secure Sockets Layer Version 3.0s
Automated Threat Handbook
Complete Guide to Photography for Beginners
What's New with FreeNAS » The ZFS ZIL and SLOG Demystified
Performance Co-Pilot
awesome-malware-analysis/README.md at master · rshipp/awesome-malware-analysis
WebGoat: A deliberately insecure Web Application
isicad :: NURBS and CAD: 30 Years Together
leonteale/pentestpackage
Your Life Is Tetris. Stop Playing It Like Chess. — Life Learning