Re-balancing Deflate Compression Levels
klauspost 0 31st January 2016 Go, Programming, WebAfter I have spent a lot of time optimizing the Go deflate compression, I found that a lot of my benchmarks were looking like this:
After I have spent a lot of time optimizing the Go deflate compression, I found that a lot of my benchmarks were looking like this:
Last week I gave myself the challenge to create something in a week. Not a mockup, but a complete usable solution with documentation and enough tests to make it feel solid. I have been looking at DigitalOcean for some time, and while browsing their documentation I came across a sample script that would help you set…
This is the final chapter in our trilogy of exploring deflate performance. In this I will give a detailed description of how you can get close to constant time compression for gzip/zip and standard deflate running at approximately 150MB/s per core.
In our previous performance test, we looked at high throughput compression, suited for log files, map-reduce data, etc. This post will deal with webserver performance, where we will investigate which gzip is best suited for a Go webserver. Update (18 Sept 2015): Level 1 compression has been updated to a faster version, so the difference…
As a continuation of my release of a Optimized gzip/zip packages. I have done some informal benchmarks to get an impression of performance characteristics of the various libraries. I have compiled the results in a spreadsheet you can view yourself. Update (18 Sept 2015): Level 1 compression has been updated to a faster version, so the difference to…
Continuing my previous posts [1][2] on checking passwords against dictionaries, I have completed a dictionary for the extremely paranoid. It is a compilation of the ‘Crackstation‘, ‘g0tmi1k‘ and ‘WPA-PSK WORDLIST 3 Final’ dictionaries. The passwords are all in lower-case, Unicode NFKD normalized, unique and sorted. I also dropped all passwords shorter than 8 characters and more…
We have all encountered them: Password Requirements. They are a well-intended attempt to make sure that your personal information stays hidden, and only you can access your websites. However, there are still many very annoying password requirements, and attempts at visualizing a “password strength” to help you choose a good password. However, I find that…