Graphs From My Todo.txt -

I am a really lazy person, there, I said it. I also get distracted really often. These two things combined might be the worst thing that can happen to one’s productivity. After trying many methods of creating todo lists, I have settled on two. Markdown files for detailed note-taking, and todo.txt for the list of things to do. On my phone, the Simpletask Cloudless app did an amazing job of bringing some order into my chaotic schedule.

···

Numerical Domains of China -

I recently noticed that numbers are used a lot in China for email addresses and user names. I also found out that a number of popular websites, such as Alibaba and Baidu, had official domain names that are entirely numbers. It seemed that people had a preference for numbers instead of latin letters, and even big websites wanted to accommodate for this. My girlfriend later confirmed that there are indeed lots of websites using just numbers as their domains.

···

About Slowloris -

You may have heard of DDoS attacks with huge amounts of bandwidth and compromised devices. But there is another, simpler, attack that only needs one computer and a really small amount of bandwidth. It’s called Slowloris. Even though the original script for the attack came out in 2009, that is seven years ago, it still affects a significant amount of servers. In this article, I will try to explain what it does first, and then show you how a really simple implementation can be written.

···

About the WHOIS Protocol -

If you are a web developer, chances are you have used whois before. WHOIS allows you to retrieve basic information about a domain such as when it was registered, when it will expire and the contact information of the owner. There are lots of websites and command line tools that allow you to query this information, but they all use the same protocol in the background. The WHOIS protocol is a simple, plaintext-based protocol that listens on TCP port 43.

···

Why Refback Still Matters -

Let’s say you have a blog and you just published an article. Ideally, that article will be shared on the web, linked from other people’s blog posts and mentioned in social media comments. These links that point back to your article are fittingly called LinkBacks. Monitoring these linkbacks is important to website owners and bloggers. They allow you to follow the spread of your articles through the internet. The idea is; when someone on the internet links to your article, you get a linkback notification from them.

···

Asynchronous Servers In Rust -

Hello everyone. I’ve wanted to use async i/o in Rust for some time but the verbosity of Mio, the generally accepted Rust async library was holding me back. With the recent release of Tokio I wanted to give it another go. In case you don’t know, Tokio is a library that is built on top of Mio and it aims to make writing clients and servers as easy as possible. We’re going to be writing a QOTD or Quote of the Day server.

···

Explaining Ed -

I am sure everyone has tried to use ed at least once. And I’m also sure some people have read Ed, the standard text editor. Its cryptic error messages (just ? actually) and the lack of any user interface probably turns most people away from it. I have to admit, I tried to use it before without any success. I spent probably 15 seconds in it before kill -9‘ing the process.

···

Lolcat Clone in x64 Assembly -

Hey there! In this post, I will be coding a clone of the lolcat program. Lolcat is basically cat with colors. It copies its standard input to its standard output, but modifies the content so that it’s colorful. Here’s a screenshot of lolcat. Please note that this article is a bit long. You can go here for screenshots and the final code. The original lolcat is written in Ruby, but our rewrite will be in x64 assembly.

···

Surviving on a Metered Connection -

Hello everyone! After moving to a new place, we were surprised to see that our internet provider options were quite limited. In fact we were only given 2 choices. We could either have a metered connection that we could start using immediately or we could have a non-metered one if we waited for about two weeks. My father wanted to have an internet connection as quickly as possible so despite my efforts to wait for the non-metered one, we ended up going with the metered connection.

···

Reverse Engineering A Mysterious UDP Stream in My Hotel -

Hey everyone, I have been staying at a hotel for a while. It’s one of those modern ones with smart TVs and other connected goodies. I got curious and opened Wireshark, as any tinkerer would do. I was very surprised to see a huge amount of UDP traffic on port 2046. I looked it up but the results were far from useful. This wasn’t a standard port, so I would have to figure it out manually.

···