Wintermute

250 posts

Wintermute

Wintermute

@wintermute_hex

Katılım Mayıs 2017
58 Takip Edilen6 Takipçiler
SumitM
SumitM@SumitM_X·
Your microservices architecture implements OAuth 2.0 for authentication, but you're facing challenges propagating the OAuth token through internal service-to-service calls, leading to unauthorized requests. How would you redesign the security architecture to propagate authentication tokens across internal services?
English
34
69
736
120.1K
Wintermute retweetledi
javinpaul
javinpaul@javinpaul·
10 Best System design Topics for interviews 1. Caching 2. DB Sharding 3. load-balancing 4. replication 5. fault-tolerance 6. high-availability 7. Performance 8. scalability 9. Performance 10. Indexing learn more on DesignGuru - bit.ly/3pMiO8g
javinpaul tweet media
English
1
121
617
59.5K
Wintermute retweetledi
Alex Xu
Alex Xu@alexxubyte·
Top 12 Tips for API Security - Use HTTPS - Use OAuth2 - Use WebAuthn - Use Leveled API Keys - Authorization - Rate Limiting - API Versioning - Whitelisting - Check OWASP API Security Risks - Use API Gateway - Error Handling - Input Validation – Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): bit.ly/3KCnWXq
Alex Xu tweet media
English
7
370
1.8K
148.6K
Wintermute retweetledi
javinpaul
javinpaul@javinpaul·
I have created a GitHub repository to help you learn system design weeks ago. And it received 400+ stars on GitHub. I've added many case studies to make it easy for you It gives you: - System design interview tips - System design fundamentals repo - github.com/javabuddy/best…
javinpaul tweet media
English
4
111
567
41.5K
Wintermute retweetledi
Marco Lancini
Marco Lancini@lancinimarco·
⚗️ localtoast Localtoast is a scanner for running security-related configuration checks such as CIS benchmarks in an easily configurable manner. github.com/google/localto…
English
1
12
57
6.8K
Wintermute retweetledi
Alex Xu
Alex Xu@alexxubyte·
My recommended materials for cracking your next technical interview: Coding - Leetcode - Cracking the coding interview book - Neetcode System Design Interview - System Design Interview book 1, 2 by Alex Xu - Grokking the system design by Design Guru - Design Data-intensive Application book Behavioral interview - Tech Interview Handbook (Github repo) - A Life Engineered (YT) - STAR method (general method) OOD Interview - Interviewready - OOD by educative - Head First Design Patterns Book Mock interviews - Interviewingio - Pramp - Meetapro Apply for Jobs - Linkedin - Monster - Indeed Over to you: What is your favorite interview prep material? – Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): bit.ly/3KCnWXq
English
46
1.2K
5.4K
700K
Wintermute retweetledi
Alex Xu
Alex Xu@alexxubyte·
OAuth 2.0 Flows Authorization Code Flow: The most common OAuth flow. After user authentication, the client receives an authorization code and exchanges it for an access token and refresh token. Client Credentials Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Implicit Code Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Resource Owner Password Grant Flow: Allows users to provide their username and password directly to the client, which then exchanges them for an access token. Over to you - So which one do you think is something that you should use next in your application? – Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): bit.ly/3KCnWXq
Alex Xu tweet media
English
18
488
1.9K
181.4K
Wintermute retweetledi
shubs
shubs@infosec_au·
I’ve been using jswzl.io for the last month. If you reverse engineer JavaScript this is a must have tool. @CharlieEriksen has done an excellent job.
English
6
58
329
24.2K
Wintermute retweetledi
Alex Xu
Alex Xu@alexxubyte·
CI/CD Pipeline Explained to Kids Section 1 - SDLC with CI/CD The software development life cycle (SDLC) consists of several key stages: development, testing, deployment, and maintenance. CI/CD automates and integrates these stages to enable faster, more reliable releases. When code is pushed to a git repository, it triggers an automated build and test process. End-to-end (e2e) test cases are run to validate the code. If tests pass, the code can be automatically deployed to staging/production. If issues are found, the code is sent back to development for bug fixing. This automation provides fast feedback to developers and reduces risk of bugs in production. Section 2 - Difference between CI and CD Continuous Integration (CI) automates the build, test, and merge process. It runs tests whenever code is committed to detect integration issues early. This encourages frequent code commits and rapid feedback. Continuous Delivery (CD) automates release processes like infrastructure changes and deployment. It ensures software can be released reliably at any time through automated workflows. CD may also automate the manual testing and approval steps required before production deployment. Section 3 - CI/CD Pipeline A typical CI/CD pipeline has several connected stages: - Developer commits code changes to source control - CI server detects changes and triggers build - Code is compiled, tested (unit, integration tests) - Test results reported to developer - On success, artifacts are deployed to staging environments - Further testing may be done on staging before release - CD system deploys approved changes to production – Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): bit.ly/42Ex9oZ
Alex Xu tweet media
English
23
1K
3.7K
383.8K
Wintermute retweetledi
Clint Gibler
Clint Gibler@clintgibler·
☁️ How to get rid of AWS access keys: Replacing the authentication @0xdabbad00 discusses alternative solutions to using access keys → OpenID Connect for other clouds → IAM Roles Anywhere or Systems Manager Hybrid Activation for on-prem wiz.io/blog/how-to-ge…
English
1
6
29
3.8K
Wintermute retweetledi
freeCodeCamp.org
freeCodeCamp.org@freeCodeCamp·
As a developer, you may feel pressure to learn new things all the time. And while it's good to stay on top of things, don't forget about the fundamentals. In this guide, @tamerlan_dev lays out the key CS concepts you should know – and how to learn them. freecodecamp.org/news/what-ever…
English
2
149
524
85.5K
Wintermute retweetledi
Alex Xu
Alex Xu@alexxubyte·
What does API gateway do? The diagram below shows the detail. Step 1 - The client sends an HTTP request to the API gateway. Step 2 - The API gateway parses and validates the attributes in the HTTP request. Step 3 - The API gateway performs allow-list/deny-list checks. Step 4 - The API gateway talks to an identity provider for authentication and authorization. Step 5 - The rate limiting rules are applied to the request. If it is over the limit, the request is rejected. Steps 6 and 7 - Now that the request has passed basic checks, the API gateway finds the relevant service to route to by path matching. Step 8 - The API gateway transforms the request into the appropriate protocol and sends it to backend microservices. Steps 9-12: The API gateway can handle errors properly, and deals with faults if the error takes a longer time to recover (circuit break). It can also leverage ELK (Elastic-Logstash-Kibana) stack for logging and monitoring. We sometimes cache data in the API gateway. Over to you: 1) What’s the difference between a load balancer and an API gateway? 2) Do we need to use different API gateways for PC, mobile and browser separately? — Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): bit.ly/42Ex9oZ
Alex Xu tweet media
English
25
612
2.4K
301.8K
Wintermute retweetledi
Library Mindset
Library Mindset@librarymindset·
20 Philosophy Books That Everyone Should Read: 1)
Library Mindset tweet media
English
21
700
3.5K
615.8K
Wintermute retweetledi
Clint Gibler
Clint Gibler@clintgibler·
📈 Modernizing Secrets Scanning: Part 2–the Semantic Eureka Secrets detection approaches that rely on known structure or high entropy are fundamentally limited Nikolai found a code-aware tool improved their detection rate 200%, reduced noise hackernoon.com/modernizing-se…
English
0
3
5
1.4K
Wintermute retweetledi
Clint Gibler
Clint Gibler@clintgibler·
🧑‍🎓 Security Study Plan A complete practical study plan to become a successful security professional in: * Pen testing * AppSec * Cloud Security * DevSecOps and more By @jassics github.com/jassics/securi…
English
1
40
136
12.8K
Wintermute retweetledi
Clint Gibler
Clint Gibler@clintgibler·
🔥 Introducing Cloudfoxable A gamified cloud hacking sandbox to learn AWS #pentesting Scenarios based on real cloud pen tests Flags to reward you for finding new entry points & lateral movement paths By @sethsec bishopfox.com/blog/cloudfoxa…
English
0
32
109
14.2K