In this tutorial we are going to show how easy it is to build a notification feed using GetStream.io. First of all, let's quickly introduce you to our fictional example app. It's called bug-your-friends.com and allows you interact with your friends, ping them, follow them or poke them. Here's a quick list of example interactions:
- poke another user (eg. Thierry pokes Alessandra)
- follow a user (eg. Tommaso follows Iris)
- ping a user (eg. Josie pings Carolina)
Whenever a user is part of one of these interactions, we want to update his notification feed, update the number of unseen and unread
I often get asked which tools are good to use for securing your AWS infrastructure so I figured I'd write a short listof some useful Security Tools for the AWS Cloud Infrastructure.
This list is not intended be something completely exhaustive, more so provide a good launching pad for someone as they dig into AWS and want to make it secure from the start.
- Make a list of competitive/alternative services: See competitors.md file
- Set up Google News alerts for "side project marketing" and "startup marketing".
- Make list of blogs, subscribe to RSS feeds in Feedbin:
- Startup marketing blogs
- Side project blogs
- Small business marketing blogs
- Chicago small business/startup bloggers
- Come up with a name and domain name
| #!/bin/sh | |
| # Credits to: | |
| # - http://vstone.eu/reducing-vagrant-box-size/ | |
| # - https://github.com/mitchellh/vagrant/issues/343 | |
| aptitude -y purge ri | |
| aptitude -y purge installation-report landscape-common wireless-tools wpasupplicant ubuntu-serverguide | |
| aptitude -y purge python-dbus libnl1 python-smartpm python-twisted-core libiw30 | |
| aptitude -y purge python-twisted-bin libdbus-glib-1-2 python-pexpect python-pycurl python-serial python-gobject python-pam python-openssl libffi5 |
| #!/usr/bin/env perl | |
| # Pandoc filter which converts paragraps containing only the LaTeX \newpage | |
| # command into appropriate pagebreak markup for other formats. | |
| # | |
| # You will need perl version 5.10.1 or higher <https://www.perl.org/get.html> | |
| # (Strawberry Perl recommended on Windows!) | |
| # and a module installer <http://www.cpan.org/modules/INSTALL.html> | |
| # and the Pandoc::Elements module version 0.33 or higher | |
| # <https://metacpan.org/pod/Pandoc::Elements> |
Everything I'm talking about below is not new, but I thought it was an interesting idea and realized I already had the majority of pieces in place to play with it. I want to share what I learned. If you are at all interested in exploring this topic further a good paper on it is here. Also, a few years ago IOActive published a blog post on the technique which is also a good read. Finally, the last two paragraphs in section 6 of RFC5246 clearly document the problem the best I've been able to find:
Any protocol designed for use over TLS must be carefully designed to
deal with all possible attacks against it. As a practical matter,
this means that the protocol designer must be aware of what security
properties TLS does and does not provide and cannot safely rely on
the latter.
| import re | |
| import os | |
| import sys | |
| ip_re = re.compile(r'.* has address .*') | |
| ec2 = re.compile(r'ec2-') | |
| def ip_to_ec2(ip): | |
| output = os.popen('host ' + ip).read() | |
| hostname = output.split(' ')[4].rstrip() |
| 16716594 n003-000-000-000.static.ge.com | |
| 11063439 nothing.attdns.com | |
| 4975683 hn.kd.ny.adsl | |
| 2683538 static.kpn.net | |
| 2647717 localhost | |
| 1759131 walmart.com | |
| 1098677 unknown.Level3.net | |
| 1024262 | |
| 774367 no-dns-yet.demon.co.uk | |
| 528853 no-data |