One of the most widely used raster image formats, that supports lossless compression, alpha transparency and is supported by all the webbrowsers. It was developed in 1996 as an improved, non-patented replacement for GIF (“PNG’s not GIF”). ISO and IETF standard.
Form Data
How form data can get from the browser to the backend.
Without JS
action
: where to send the data (URL, current URL by default)method
:GET
,POST
(and there’sdialog
too…)enctype
: only forPOST
,Content-Type
of the dataapplication/x-www-form-urlencoded
- default, URL encoded bodymultipart/form-data
- multipart data, required for file uploadstext/plain
- for debugging, don’t use, security issues
Go(lang) - advanced topics
Concurrency
Goroutines
Goroutine: a lightweight thread managed by the Go runtime.
It’s pretty simple to execute a function call as a new goroutine:
go f(param1, param2)
The program is terminated when the main goroutine finishes.
Go(lang)
What?
- statically typed (w/ type inference)
- compiled (statically linked)
- memory safety, garbage collection
- built in dependency management
- concurrency:
- goroutines (~coroutines/threads)
- channels
- select (for channels)
- interfaces for “virtual inheritance”, type embedding
- standardized formatting (gofmt)
- multiple implementations (gc, gccgo, gollvm, gopherjs, …)
Rate limiting
Why?
- DoS - Denial of Service attacks
- Brute Force attacks
- collect customer email addresses (signup)
- reveal username/password pairs (login)
- send emails (contact us, gift card)
Cross-Site Request Forgery
CSRF is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
Cross Site Scripting (XSS)
Data (from untrusted source) gets into the application, then this data is later displayed in the website without being properly validated/sanitized/escaped.
Cross-Origin Resource Sharing
Modern browsers apply the same-origin policy to some resources, meaning they refuse to load or restrict access to resources coming from other origins than the loaded website. Servers can implement CORS to describe which origins are permitted to load their resources.
For some HTTP requests, browsers issue a “preflight” request (HTTP OPTIONS) to check whether the resource is available for the given origin.
PGP/GPG
PGP: Pretty Good Privacy
GPG: GNU Privacy Guard
PGP
- from 1991
- cryptographically sign/verify, encrypt/decrypt files, emails, etc.
- OpenPGP standard, RFC 4880
- key “verification” via fingerprints, Web of trust
- public/private keys
Cellular noise
Random points
- true randomness is hard
- pseudo random number generators usually don’t have even distribution
- or “slow”
- or cannot be used in a parallel way
- OpenGL does not have random API (reasons above)
And in most cases higher “entropy” is more pleasant to the eyes.