A Serverless Sequence Diagram

Paul Hammant has a quick and simple blog post illustrating the request-response sequence in the web application on a serverless infrastructure.  I find it quite useful as a reference, when explaining serverless to people who are considering it for the first time.

This stuff and the abandonment of names:ports in the config is a key advance for our industry. It is like a limiting Unix problem has been overcome. While it is still is impossible for two processes on one server to listen on the same port (say port 443), it is now not important as we have a mechanism for efficiently stitching together components (functions) of an application together via the simplest thing – a name. A name that is totally open for my naming creativity (ports were restricted if they were numbered below 1024 and also tied to specific purposes) . We’re also relieved of the problem of having to think of processes now, and whether they’ve crashed and won’t be receiving requests any more. Here’s a really great, but rambling, rant on a bunch of related topics by Smash Company that you should read too as it touches on some of the same things but goes much broader.

The Book of Secret Knowledge

The Book of Secret Knowledge” is a collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more.  It is intended for everyone and anyone – especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.

While you are at it, also have a look at:

Well-Known URIs

Back when Let’s Encrypt started giving out free SSL certificates, one bit that visible all over the web was the “well-known” directory.  I never thought much about it – it’s just a name after all.

Turns out, there is actually an RFC 5785 that defines a standard for the well-known uniform resource identifiers (URIs).  And that’s a lot more generic than just the bit that Let’s Encrypt needs.

Accidentally stumbled upon this while reading “A Well-Known URL for Changing Passwords” draft.

Faces of Open Source

Faces of Open Source is an on-going photographic documentation of the people behind the development and advancement of the open source revolution that has transformed the technology industry.

Given the immense contribution of these people to the world around us, I find it surprising that they are so far from the celebrity status and most people in the world won’t know any of these faces.  Even people in technology sector itself, won’t probably name even half of these people by the picture alone.  For some, even the name won’t mean anything.

Kudos to this project for trying to make these faces slightly more familiar and for giving credit where credit is due.

Beyond Passwords: 2FA, U2F and Google Advanced Protection

Beyond Passwords: 2FA, U2F and Google Advanced Protection” is a rather lengthy, but insightful article on the subject of 2-factor authentication, multi-factor authentication, and other related options.  It nicely explains which option is which and how it works, as well as clears a lot of confusion between these terms.

The article itself is not too technical, so it’s strongly recommended for anyone dealing with authentication, sensitive data, and security in general.