Hi everyone! 👋
Welcome to cron.weekly issue #146.
A quick heads-up: I’m taking my final summer holiday break next week, so I’ll be back in your inbox on September 6th!
Enjoy your warm cup of ☕️ and happy reading.
News & general 🗞
The Chromium browser is responsible for 50% of the DNS traffic on root nameservers, all because of a feature to detect DNS interception. Wild!
This whole idea is just crazy, using commodity microphones (ie: smartphones) researchers can now 3D-print a key just by the sound it made. 🤯
A week late, but still happy birthday Debian!
We are two indie developers curating this free newsletter to keep you informed about all things API. Our focus is on developers who are regularly involved in building or integrating APIs. We bring you a list of free & paid APIs for fetching data, links for in-depth tutorials, tools, and jobs for API Developers. Sponsored
Tools & Projects 🛠
Tracee is a lightweight, easy to use container tracing tool. After launching the tool, it will start collecting traces of newly created containers.
Archivy is a self-hosted knowledge repository that allows you to safely preserve useful content that contributes to your knowledge bank.
Tunshell is a simple and secure method to remote shell into ephemeral environments such as deployment pipelines or serverless functions.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Umami is a simple, fast, website analytics alternative to Google Analytics.
ytt is a YAML templating tool that works on YAML structure instead of text.
This is the repo of the Nginx configurator built by Digital Ocean. Very powerful with lots of options.
Guides & Tutorials 🎓
This was a good step-by-step guide on moving videos (with subtitles) to a self-hosted PeerTube instance (which does P2P video streaming) using Docker.
An oldie but a goodie: in Unix, wildcards can sometimes have some unintended (for the user) consequences. This post gives a clear summary of the dangerous cases and the results.
This guide explores how to configure a three-node
etcd cluster that will be used by a highly available, multinode K3s cluster.