Secure the Border and Build the Wall — A Compendium of Access Control on Unix-Like OSes

Beginner's Guide to Installing from Source (2015)

Fixing the Next 10,000 Aliasing Bugs

Issue #343

3/8/2023

{{PreviewText}} 

Yo yo yo
Has anyone used any good libraries for extracting text content from HTML pages? I'm currently using crux, but it doesn't seem great.
I love rediscovering an old band I used to listen to. It's almost like a form of time travel, whisking you back to the state-of-mind you were in when first listening to that band.
Anyway, here's the issue.

====================================================================

Secure the Border and Build the Wall — A Compendium of Access Control on Unix-Like OSes

Published: 28 February 2023
Tags: linux, os, server, unix


Patrick Louis discusses security and access control in computer systems.
Some highlights:

  • A very deep-dive
  • Covers authentication, access control, isolation, logging, and general security
  • Looks at OpenBSD, SunOS, Linux, FreeBSD, macOS, and Android


====================================================================

Beginner's Guide to Installing from Source (2015)

Published: 28 August 2015
Tags: linux, unix


An older article, but useful nonetheless. Simon Kitching provides background information about relevant commands and the process in general for downloading and installing code from source.
Some highlights:

  • Highlights different methods of distribution
  • Covers security, specifically checking the checksum hash
  • Touches on build Systems: configure, make, cmake, etc


====================================================================

Fixing the Next 10,000 Aliasing Bugs

Published: 5 March 2023
Tags: crypto, java, rust


The author of this article looks at a number of common software bugs that are solved by something resembling Rusts' borrow-checker. Is it an ad for Rust? Kind of. Is it still interesting? Yup.
Some highlights:

  • Uses an implementation of a Java array to demonstrate aliasing bug
  • Explores a Solidity bug that lead to $150 million being stolen
  • Presents how these types of bugs can be eliminated


-

How did I do?

* Amazing
* Articles not relevant to me
* Articles were relevant, but badly written
* Summaries told me everything I wanted to know
* I like turtles

Want to help?

Thank you for reading! If you enjoy the newsletter, I would really appreciate you helping me spread the word by forwarding this to your friends and colleagues or sharing it on social media! Get cool stuff for your referrals using your link https://abyteofcoding.com.

Your referrals:


If you want to discuss or comment on this issue, head on over to this page at A Byte of Coding. You can also subscribe there if you're new!

Have comments or feedback? Just reply to this email or hit me up on Twitter @AByteOfCoding.

Email landed in your promotions tab? Please move it over to primary so you don't miss the latest issues in the future.
Thanks for your Support! 

Big thanks to all of the Patreon supports and company sponsors. If you want to support the newsletter you can checkout the Patreon page. It's not necessary, but it lets me know that I'm doing a good job and that you're finding value in the content.


Stats (updated daily)

Sent: 3054

Opens: 1430

Clicks: 325

Link Clicks Clicks % Unique Clicks Unique Clicks %
Secure the Border and Build the Wall — A Compendium of Access Control on Unix-Like OSes 87 34.12% 92 33.33
Beginner's Guide to Installing from Source (2015) 89 34.90% 102 36.96
Fixing the Next 10,000 Aliasing Bugs 79 30.98% 82 29.71

Previous

Back to Issues

Next