Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Introduction
00:00 • 5min
Are You Like Bootstrapped?
04:36 • 4min
How Does Cloud Flares Bot Detection Work?
08:58 • 2min
Cloud Flare Doesn't Leak a Bot Detection
10:50 • 5min
How to Bypass IP Based Rate Limitation
16:18 • 2min
How to Deal With a Bounce Rate Not Coming Through Subset of Ip Addresses
18:39 • 4min
Using a Vulnerability Management Tool for Elixir
22:20 • 2min
Docker Deep Dive Book Club
24:44 • 2min
Elixir Confidence - It's Awesome
26:34 • 5min
Erlang Security Guidelines
31:16 • 2min
Using a Plug Attack Is a Good Idea
33:34 • 3min
Peroxial Data Privacy
36:24 • 4min
Elixir Shared Access to a Large Chunk of Memory
40:00 • 3min
Using Persistent Term in an Application
43:26 • 4min
Using a Parek Seal Agent for a Cloud Ip Speed Provider
47:13 • 3min
Is Crack Seal a Competitive Advantage for Your Business?
49:49 • 2min
Persistent Term Depends on Perxial Ios Uptime
51:41 • 4min
What Are Your Picks for This Week?
55:51 • 7min