logo
episode-header-image
Feb 2022
8m 53s

Why the next Chrome version will break w...

Hussein Nasser
About this episode

 Fundamentals of Database Engineering udemy course (link redirects to udemy with coupon) https://database.husseinnasser.com

Chrome, Edge and Firefox are approaching version 100. that version is 3 digit version where most websites only checked two digits. You can imagine what can go wrong. Lets discuss

Up next
Jun 13
kTLS - Kernel level TLS
Fundamentals of Operating Systems Course https://oscourse.winktls is brilliant.TLS encryption/decryption often happens in userland. While TCP lives in the kernel. With ktls, userland can hand the keys to the kernel and the kernel does crypto. When calling write, the kernel encryp ... Show More
22m 55s
May 9
The beauty of the CPU
If you are bored of contemporary topics of AI and need a breather, I invite you to join me to explore a mundane, fundamental and earthy topic.The CPU.A reading of my substack article https://hnasr.substack.com/p/the-beauty-of-the-cpu 
9m 38s
Apr 18
Sequential Scans in Postgres just got faster
This new PostgreSQL 17 feature is game changer. They know can combine IOs when performing sequential scan. Grab my database coursehttps://courses.husseinnasser.com 
27m 36s
Recommended Episodes
Apr 2024
Chrome bientôt en version payante ?
Google vient d’annoncer qu’une version payante de son célèbre navigateur Chrome verra le jour d’ici peu. Mais ne vous inquiétez pas, cela ne vous concerne pas… du moins pas encore. Car ce Chrome payant sera essentiellement réservé aux professionnels, d’où son nom assez clair : Ch ... Show More
2 m
Jul 2023
575: CSS Errors, Proxy and Reverse Proxy, and What’s The Edge?
Bluesky adds first class support for urls as a username, text-wrap pretty update, sqwunching text update, should CSS spit out errors, anchor functionality, what does the edge mean, eSports and bowling, how to test websites on slower CPUs, and what does proxy or reverse proxy mean ... Show More
1 h
Apr 2020
JavaScript Vulnerabilities with Tim Kadlec - The State of the Web
(Originally aired on YouTube on May 30, 2018) Rick and Tim talk about how insecure much of the web really is, the various vulnerabilities in web security that can leave you open to attack, the challenge of making your organization aware of these risks, and how they could be explo ... Show More
12m 32s
Mar 2023
New exploits are tricking Chrome. [Research Saturday]
Dor Zvi, Co-Founder and CEO from Red Access to discuss their work on "New Chrome Exploit Lets Attackers Completely Disable Browser Extensions." A recently patched exploit is tricking Chrome browsers on all popular OSs to not only give attackers visibility of their targets’ browse ... Show More
15m 33s
Dec 2021
S18:E8 - How to use different memory techniques to learn coding (Kylo Robinson)
In this episode, we talk about how to use different memory techniques to learn coding with Kylo Robinson, full stack developer, coding coach, and creator of The Great Sync Javascript Mental Model. Kylo talks about how realizing he wasn’t understanding the fundamentals of javascri ... Show More
30m 38s
Feb 2023
You don’t have to build a browser in JavaScript anymore
We talk about how Next is bringing image components, server components, and in-house analytics via split bee—and bundling them all together with Turbopack, powered by Rust, our Developer Survey most loved language of 2022.Guillermo Rauch is the CEO and cofounder of Vercel and coc ... Show More
23m 36s
Oct 2019
AI in the browser
We’ve mentioned ML/AI in the browser and in JS a bunch on this show, but we haven’t done a deep dive on the subject… until now! Victor Dibia helps us understand why people are interested in porting models to the browser and how people are using the functionality. We discuss Tenso ... Show More
49m 40s
Nov 2021
Using bidirectionality override characters to obscure code. [Research Saturday]
Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ... Show More
25m 10s