background preloader


Facebook Twitter

At Scale, Rare Events aren’t Rare – Perspectives. I’m a connoisseur of failure.

At Scale, Rare Events aren’t Rare – Perspectives

I love reading about engineering failures of all forms and, unsurprisingly, I’m particularly interested in data center faults. It’s not that I delight in engineering failures. My interest is driven by believing that the more faults we all understand, the more likely we can engineer systems that don’t suffer from these weaknesses. It’s interesting, at least to me, that even fairly poorly-engineered data centers don’t fail all that frequently and really well-executed facilities might go many years between problems.

So why am I so interested in understanding the cause of faults even in facilities where I’m not directly involved? Today’s example is from a major US airline last summer and it is a great example of “rare events happen dangerously frequently at scale.” Before getting into the details of what went wrong, let’s look at the impact of this failure on customers and the business. What happened? Linux nslookup command help and examples. Updated: 04/26/2017 by Computer Hope About nslookup The nslookup command is used to query internet name servers interactively for information.

Linux nslookup command help and examples

Overview nslookup, which stands for "name server lookup", is a useful tool for finding out information about a named domain. By default, nslookup will translate a domain name to an IP address (or vice versa). Nslookup IOS Switching Services Configuration Guide, Release 12.2 - Routing Between VLANs Overview [Cisco IOS Software Releases 12.2 Mainline] Routing Between VLANs Overview This chapter provides an overview of VLANs.

IOS Switching Services Configuration Guide, Release 12.2 - Routing Between VLANs Overview [Cisco IOS Software Releases 12.2 Mainline]

It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs. This chapter describes VLANs. It contains the following sections: What Is a VLAN? VLAN Colors. 12 Extremely Useful Hacks for JavaScript – Hacker Noon. In this post I will share 12 extremely useful hacks for JavaScript. These hacks reduce the code and will help you to run optimized code. So let’s start hacking! And in case you want to be sure your JavaScript works in most browsers and mobile devices, you should probably use Endtest. 1) Converting to boolean using !! Operator Sometimes we need to check if some variable exists or if it has a valid value, to consider them as true value.

Function Account(cash) { = cash; this.hasMoney = !! Var emptyAccount = new Account(0); console.log(; // 0 console.log(emptyAccount.hasMoney); // false. How to encrypt your entire life in less than an hour. “Only the paranoid survive.” — Andy Grove Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson’s disease. When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen. And Grove isn’t the only powerful person urging caution. Even the director of the FBI — the same official who recently paid hackers a million dollars to unlock a shooter’s iPhone — is encouraging everyone to cover their webcams.

But you obey the law. Well, law-abiding citizens do have reason to fear. “If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” — Cardinal Richelieu in 1641 In this article, I will show you how you can protect yourself by leveraging state-of-the-art encryption. Common sense security for everyone. Detailed VPN Comparison Chart. Green = “Generally good”, Yellow = “Something of concern”, Red = “Something major of concern”, Blank = Undefined or for reader’s knowledge only.

Detailed VPN Comparison Chart

See what these fields mean here. You can download the VPN Comparison Chart in other formats below: Excel – xlsx | LibreOffice – ods | CSV – csv Color blind? There is a version of the table for you here. How to set up a VPN in 10 minutes for free (and why you urgently need one) Moxie Marlinspike, Next Generation Threats 2014. Oustic cryptanalysis. Summary Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components.

oustic cryptanalysis

These acoustic emanations are more than a nuisance: they can convey information about the software running on the computer and, in particular, leak sensitive information about security-related computations. In a preliminary presentation, we have shown that different RSA keys induce different sound patterns, but it was not clear how to extract individual key bits.

The main problem was the very low bandwidth of the acoustic side channel (under 20 kHz using common microphones, and a few hundred kHz using ultrasound microphones), many orders of magnitude below the GHz-scale clock rates of the attacked computers. Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. Paper A detailed account of the results and their context is given in the full version of our paper (8MB PDF). Context Usually not. All you need is code.