golang

Building Production-Ready HTTP Logging Middleware for Go's Mux Router

Bogdan Ungureanu
Building Production-Ready HTTP Logging Middleware for Go’s Mux Router Observability is the cornerstone of modern web applications. When your API starts experiencing issues at 3 AM, comprehensive logging can mean the difference between a quick fix and hours of frustrated debugging. In this guide, we’ll build a production-grade HTTP logging middleware for Gorilla Mux that goes beyond simple request logging to provide actionable insights into your application’s behavior. Why HTTP Logging Middleware Matters Every HTTP request tells a story.

Building Production-Ready Rate Limiting Middleware in Go

Bogdan Ungureanu
Building Production-Ready Rate Limiting Middleware in Go Rate limiting is your application’s first line of defense against abuse, whether from malicious actors launching denial-of-service attacks, buggy clients stuck in retry loops, or legitimate users inadvertently overwhelming your system. Without proper rate limiting, a single misbehaving client can bring down your entire service, impacting all users and potentially costing your business significant revenue and reputation. In this comprehensive guide, we’ll build a production-grade rate limiting middleware for Go HTTP servers that protects your APIs while maintaining performance and flexibility.
Write a REPL using GPT-3 and Go

Write a REPL using GPT-3 and Go

Bogdan Ungureanu

This blog post will discuss how to use the OpenAI Chat API in Golang. For this purpose we will create a simple REPL (Read-Eval-Print-Loop) that will use the GPT-3 API to generate the responses.

Connect to remote website using socks5 proxy

Bogdan Ungureanu

Businesses use the SOCKS5 proxy all of the time, mostly for security purposes. Since security is a major point of any data-driven organization, including a SOCKS5 proxy could significantly ramp up the digital security of the company’s data.

Besides securing their data, it can restrict access to particular digital services through advanced authentication, which is completely optional and comes as a courtesy of SOCKS5.

Connect to remote website using socks5 proxy

Bogdan Ungureanu
Honeypots are a security tool that is used to protect networks and systems from malicious attacks. They are designed to mimic the behavior of a real network or system, making them appear attractive to potential attackers. When an attacker targets a honeypot, they are led to believe that they have successfully breached a valuable asset, when in reality, they are interacting with a decoy. Honeypots are a valuable tool for security professionals, as they can provide valuable information about an attacker’s tactics and motivations, as well as alerting the security team to potential threats.

HTTP request tracing middleware

Bogdan Ungureanu

Request-based tracing provides a way to determine what exactly is happening with your requests and why.

It is handy when you want to reproduce and understand the problem that you are experiencing.