In this tutorial we are going to show how easy it is to build a notification feed using GetStream.io. First of all, let's quickly introduce you to our fictional example app. It's called bug-your-friends.com and allows you interact with your friends, ping them, follow them or poke them. Here's a quick list of example interactions:
- poke another user (eg. Thierry pokes Alessandra)
- follow a user (eg. Tommaso follows Iris)
- ping a user (eg. Josie pings Carolina)
Whenever a user is part of one of these interactions, we want to update his notification feed, update the number of unseen and unread
I often get asked which tools are good to use for securing your AWS infrastructure so I figured I'd write a short listof some useful Security Tools for the AWS Cloud Infrastructure.
This list is not intended be something completely exhaustive, more so provide a good launching pad for someone as they dig into AWS and want to make it secure from the start.
- Make a list of competitive/alternative services: See competitors.md file
- Set up Google News alerts for "side project marketing" and "startup marketing".
- Make list of blogs, subscribe to RSS feeds in Feedbin:
- Startup marketing blogs
- Side project blogs
- Small business marketing blogs
- Chicago small business/startup bloggers
- Come up with a name and domain name
#!/bin/sh | |
# Credits to: | |
# - http://vstone.eu/reducing-vagrant-box-size/ | |
# - https://github.com/mitchellh/vagrant/issues/343 | |
aptitude -y purge ri | |
aptitude -y purge installation-report landscape-common wireless-tools wpasupplicant ubuntu-serverguide | |
aptitude -y purge python-dbus libnl1 python-smartpm python-twisted-core libiw30 | |
aptitude -y purge python-twisted-bin libdbus-glib-1-2 python-pexpect python-pycurl python-serial python-gobject python-pam python-openssl libffi5 |
#!/usr/bin/env perl | |
# Pandoc filter which converts paragraps containing only the LaTeX \newpage | |
# command into appropriate pagebreak markup for other formats. | |
# | |
# You will need perl version 5.10.1 or higher <https://www.perl.org/get.html> | |
# (Strawberry Perl recommended on Windows!) | |
# and a module installer <http://www.cpan.org/modules/INSTALL.html> | |
# and the Pandoc::Elements module version 0.33 or higher | |
# <https://metacpan.org/pod/Pandoc::Elements> |
Everything I'm talking about below is not new, but I thought it was an interesting idea and realized I already had the majority of pieces in place to play with it. I want to share what I learned. If you are at all interested in exploring this topic further a good paper on it is here. Also, a few years ago IOActive published a blog post on the technique which is also a good read. Finally, the last two paragraphs in section 6 of RFC5246 clearly document the problem the best I've been able to find:
Any protocol designed for use over TLS must be carefully designed to
deal with all possible attacks against it. As a practical matter,
this means that the protocol designer must be aware of what security
properties TLS does and does not provide and cannot safely rely on
the latter.
import re | |
import os | |
import sys | |
ip_re = re.compile(r'.* has address .*') | |
ec2 = re.compile(r'ec2-') | |
def ip_to_ec2(ip): | |
output = os.popen('host ' + ip).read() | |
hostname = output.split(' ')[4].rstrip() |
16716594 n003-000-000-000.static.ge.com | |
11063439 nothing.attdns.com | |
4975683 hn.kd.ny.adsl | |
2683538 static.kpn.net | |
2647717 localhost | |
1759131 walmart.com | |
1098677 unknown.Level3.net | |
1024262 | |
774367 no-dns-yet.demon.co.uk | |
528853 no-data |