-
ARM assembler in Raspberry Pi – Chapter 4
As we advance learning the foundations of ARM assembler, our examples will become longer. Since it is easy to make mistakes, I think it is worth learning how to use GNU Debugger
gdb
to debug assembler. If you develop C/C++ in Linux and never usedgdb
, shame on you. If you knowgdb
this small chapter will explain you how to debug assembler directly. -
ARM assembler in Raspberry Pi – Chapter 3
-
ARM assembler in Raspberry Pi – Chapter 2
Registers
At its core, a processor in a computer is nothing but a powerful calculator. Calculations can only be carried using values stored in very tiny memories called registers. The ARM processor in a Raspberry Pi has 16 integer registers and 32 floating point registers. A processor uses these registers to perform integer computations and floating point computations, respectively. We will put floating registers aside for now and eventually we will get back to them in a future installment. Let’s focus on the integer registers.
-
ARM assembler in Raspberry Pi – Chapter 1
In my opinion, it is much more beneficial learning a high level language than a specific architecture assembler. But I fancied learning some ARM assembler just for fun since I know some 386 assembler. The idea is not to become a master but understand some of the details of what happens underneath.
-
Fast and easy way to block bots from your website using Apache
Some weeks ago the site I work on started having severe outages. It looked like the system was not able to fulfill the incoming requests fast enough, making the passenger queue to grow faster than new requests could be served.
Looking at the rails logs it looked like some Chinese bot was crawling the entire site, including a long list of dynamic pages that took a long time to generate and that are not usually visited. Those pages were not yet cached, so every request went through the rails pipeline. Once you start having the dreadful problem of your passenger queue to grow faster and faster you are usually doomed.
Since you can’t expect some of the malicious bots out there to respect the
robots.txt
file, I had to filter those requests at the Apache level so they did not even reach the application level. This past few months I’ve been learning a lot of systems administration, basically because it’s us, the developers, who also handle this part of the business.Since all those requests came from the same
user agent
, I looked for a simple way to filter the requests based on this criteria. It can be easily done if you use themod_access
Apache module. All you need to do is make use of theAllow
andDeny
directives. Here’s a simple example to filter theezooms
bot:What this piece of code does is very self explanatory. The first line tells Apache to set up an environment variable called
BlockUA
if theuser agent
of the request matches the “ezooms
” string. Then you tell Apache the order it has to evaluate the access control to the directory: it first has to evaluate theAllow
directive, and then theDeny
one. After that you set up both directives.Allow from all
basically allows everything in.Deny from env=BlockUA
denies all requests in which the environment variableBlockUA
has been set. Since that variable is set up when theuser agent
matches our desired string, the config will basically deny access to the application to all requests with the “ezooms
” user agent.This way you can easily protect yourself from basic bot attacks.