Blog

Thoughts from two software engineers. You can filter posts by tags or by category.

Security: What is Cross-Site Request Forgery?

by

Cross-Site Request Forgery is a pretty well known security vulnerability, yet many developers still fail to secure their applications. Let’s discuss this!

Security: What is Server Side Request Forgery?

by

Cross-site Request Forgery or CSRF is a well known security vulnerability. But what is SSRF?

Fundamentals: The Internet Protocol

by

How do you scale a network to global proportions? The answer is the Internet Protocol. Let’s dive into it.

What can we learn from Kubernetes' first major security hole?

by

Kubernetes first major security hole is out… does this mean Kubernetes is not secure? What can we learn from it?

Kubernetes is hard

by

Kubernetes won the container wars… allegedly. However, Kubernetes is still hard and causing a lot of grief.

Fundamentals: VLANs explained

by

How do you run multiple networks over the same physical network? How do virtual LANs work?

Fundamentals: Ethernet explained

by

Ethernet is one of the most fundamental protocols underpinning todays internet. It is so fundamental that we often take it as granted and don’t even think about it.

Why Immutability Matters

by

I’ve talked about immutable objects in clean code before, but what exactly are they? Why do we use them?

Why should you use interfaces?

by

I’ve received the same question from a fair number of people: why would you even use interfaces?