New codingmarks added in the 6th week of 2018

New codingmarks added in the 6th week of 2018. Hot topics include:

angular-material

Angular Material

Material Design components for Angular

architecture

Sidecar pattern – Microsoft Docs

Deploy components of an application into a separate process or container to provide isolation and encapsulation.

Dan McKinley :: Choose Boring TechnologyCrazySane

• published on: 2015-03-30
• tags: coding, architecture

• Embrace boredom
• Optimize Globally
• Choose New Technology, Sometimes
• Just Ship

cheatsheet

GitHub – LeCoupa/awesome-cheatsheets

awesome-cheatsheets – ðŸ“š Awesome cheatsheets for popular programming languages, frameworks and development tools. They include everything you should know in one single file.

coding

Dan McKinley :: Choose Boring TechnologyCrazySane

• published on: 2015-03-30
• tags: coding, architecture

• Embrace boredom
• Optimize Globally
• Choose New Technology, Sometimes
• Just Ship

cryptography

Public Key Cryptography: RSA Encryption Algorithm – YouTube

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler’s Theorem, Euler’s Phi function, prime factorization, modular exponentiation and time complexity.

Asymmetric encryption – Simply explained – YouTube

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I’ll explain this in plain Englishâ€¦ Nice explanation

design-patterns

Sidecar pattern – Microsoft Docs

Deploy components of an application into a separate process or container to provide isolation and encapsulation.

encryption

Public Key Cryptography: RSA Encryption Algorithm – YouTube

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler’s Theorem, Euler’s Phi function, prime factorization, modular exponentiation and time complexity.

Asymmetric encryption – Simply explained – YouTube

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I’ll explain this in plain Englishâ€¦ Nice explanation

javascript

GitHub – LeCoupa/awesome-cheatsheets

awesome-cheatsheets – ðŸ“š Awesome cheatsheets for popular programming languages, frameworks and development tools. They include everything you should know in one single file.

Hammer.JS – Hammer.js

A JavaScript library for detecting touch gestures.

json

JSON Hijacking – You’ve Been Haacked

A while back I wrote about a subtle JSON vulnerability which could result in the disclosure of sensitive information. That particular exploit involved overriding the JavaScript Array constructor to disclose the payload of a JSON array, something which most browsers do not support now.

microservices

Sidecar pattern – Microsoft Docs

Deploy components of an application into a separate process or container to provide isolation and encapsulation.

network

Spoofing attack – Wikipedia

In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.

networking

Virtual LAN – Wikipedia

A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). VLANs work by applying tags to network packets and handling these tags in networking systems â€“ creating the appearance and functionality of network traffic that is physically on a single network but acts as if it is split between separate networks. In this way, VLANs can keep network applications separate despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.

nodejs

GitHub – LeCoupa/awesome-cheatsheets

awesome-cheatsheets – ðŸ“š Awesome cheatsheets for popular programming languages, frameworks and development tools. They include everything you should know in one single file.

rsa

Public Key Cryptography: RSA Encryption Algorithm – YouTube

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler’s Theorem, Euler’s Phi function, prime factorization, modular exponentiation and time complexity.

security

STRIDE (security) – Wikipedia

STRIDE is a threat classification model developed by Microsoft for thinking about computer security threats.[1] It provides a mnemonic for security threats in six categories.

The threat categories are:

• Spoofing of user identity
• Tampering
• Repudiation
• Information disclosure (privacy breach or data leak)
• Denial of service (D.o.S)
• Elevation of privilege

Ransomware – Wikipedia

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem â€“ and difficult to trace digital currencies such as Ukash and Bitcoin are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

Spoofing attack – Wikipedia

In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.

Public Key Cryptography: RSA Encryption Algorithm – YouTube

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler’s Theorem, Euler’s Phi function, prime factorization, modular exponentiation and time complexity.

Virtual LAN – Wikipedia

A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). VLANs work by applying tags to network packets and handling these tags in networking systems â€“ creating the appearance and functionality of network traffic that is physically on a single network but acts as if it is split between separate networks. In this way, VLANs can keep network applications separate despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.

Asymmetric encryption – Simply explained – YouTube

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I’ll explain this in plain Englishâ€¦ Nice explanation

JSON Hijacking – You’ve Been Haacked

A while back I wrote about a subtle JSON vulnerability which could result in the disclosure of sensitive information. That particular exploit involved overriding the JavaScript Array constructor to disclose the payload of a JSON array, something which most browsers do not support now.

tools

Drivel Defence text

This tools numbers to words in your sentences in a nice report.

Plain English Campaign is an independent group fighting for plain English in public communication. We oppose gobbledygook, jargon and legalese.

Gunning Fog Index

This is a tool that tries to calculate the Gunning Fog Index. It is a weighted average of the number of words per sentence, and the number of long words per word. An interpretation is that the text can be understood by someone who left full-time education at a later age than the index.

A to Z of Alternative Words

If you find yourself about to write, type or dictate a word you wouldn’t use in every day
conversation, look it up in the A to Z. You should find a simpler alternative. Often there will
be a choice of several words. You need to pick the one that best fits what you are trying to
say.

The Up-Goer Five Text Editor

CAN YOU EXPLAIN A HARD IDEA USING ONLY THE TEN HUNDRED MOST USED WORDS? IT’S NOT VERY EASY. TYPE IN THE BOX TO TRY IT OUT.

Hemingway Editor

Hemingway makes your writing bold and clear. It’s like a spellchecker, but for style. It makes sure that your reader will focus on your message, not your prose.

writing

Drivel Defence text

This tools numbers to words in your sentences in a nice report.

Plain English Campaign is an independent group fighting for plain English in public communication. We oppose gobbledygook, jargon and legalese.

Gunning Fog Index

This is a tool that tries to calculate the Gunning Fog Index. It is a weighted average of the number of words per sentence, and the number of long words per word. An interpretation is that the text can be understood by someone who left full-time education at a later age than the index.

A to Z of Alternative Words

If you find yourself about to write, type or dictate a word you wouldn’t use in every day
conversation, look it up in the A to Z. You should find a simpler alternative. Often there will
be a choice of several words. You need to pick the one that best fits what you are trying to
say.

The Up-Goer Five Text Editor

CAN YOU EXPLAIN A HARD IDEA USING ONLY THE TEN HUNDRED MOST USED WORDS? IT’S NOT VERY EASY. TYPE IN THE BOX TO TRY IT OUT.

Hemingway Editor

Hemingway makes your writing bold and clear. It’s like a spellchecker, but for style. It makes sure that your reader will focus on your message, not your prose.

New codingmarks added in the 6th week of 2018 was originally published by Codingpedia Association at CodingpediaOrg on February 12, 2018.

Source:: codingpedia.org