Completed
Scaling and Securing WebSockets with HAProxy
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Network Engineering
Automatically move to the next video in the Classroom when playback concludes
- 1 The OSI Model - Explained by Example
- 2 TCP vs UDP Crash Course
- 3 Port forwarding with NAT and iptables (transparent proxying) - “Run” your webapp on port 80
- 4 Network Address Translation - NAT Explained
- 5 TCP Tunneling Applications Pros and Cons (Explained by Example)
- 6 How much bandwidth do you really need? (Web browsing, streaming and gaming)
- 7 Denial of Service Attacks Explained
- 8 Public IP vs. Private IP and Port Forwarding (Explained by Example)
- 9 Load Balancer vs Reverse Proxy (Explained by Example)
- 10 Do you REALLY need a VPN?
- 11 How Tor Works? (The Onion Router)
- 12 Programmatically Open External Ports with UPNP
- 13 Address Resolution Protocol - ARP
- 14 Fail-over and High-Availability (Explained by Example)
- 15 What happens when you type google.com into your browser and press enter? (Detailed Analysis)
- 16 Server Name Indication (SNI) (Explained by Example)
- 17 Scaling and Securing WebSockets with HAProxy
- 18 Docker Volumes Explained (PostgreSQL example)
- 19 Building a Multi-player Game with WebSockets
- 20 SSL/TLS Termination, TLS Forward Proxy Pros and Cons
- 21 How public WIFI can be sniffed?
- 22 Setup Active-Passive Cluster with Keepalived & HAProxy (Two raspberry pis)
- 23 Active-Active vs Active-Passive Cluster to Achieve High Availability in Scaling Systems
- 24 SSH Tunneling - Local & Remote Port Forwarding (by Example)
- 25 A Good Network Engineering Videos Resource Recommendation
- 26 Multicast DNS Explained
- 27 What is the TCP 3-Way Handshake and Why Backend Engineers should understand it
- 28 Wiresharking CURL - How a single GET request translates to 10 TCP Packets
- 29 What is TCP Slow Start and how Does it affect your Web Application Performance?
- 30 Expose Local WebSocket, HTTP and HTTPS WebServers to the Public Internet with Ngrok
- 31 TCP Half-Open Explained
- 32 Career Path Advice - Moving from a Network Engineer to a Backend Engineer
- 33 Demystifying the Browser Networking Tab in Developer Tools With Examples
- 34 What is a Virtual IP Address? How does it help with High-Availability
- 35 How HTTP Tunneling works, The CONNECT method, Pros & Cons and more
- 36 NAT Slipstreaming Vulnerability Explained
- 37 NEW GENIUS DNS Cache Poisoning Attack - SAD DNS Explained
- 38 iptables Demystified - Port Redirection and Forwarding HTTP Traffic to another machine (part 1)
- 39 iptables Demystified - Load Balancing without a Load Balancer (no software installation) (part 2)
- 40 Technical Discussion on VPNs - How VPNs Work, their benefits, and What happens when VPNs are Hacked
- 41 HTTP Code 502 Bad Gateway Explained (All its Possible Causes on the Backend)
- 42 Following an HTTP GET / through Switches, Routers, Gateways, and Proxies (Detailed Examples)
- 43 Hub vs Switch vs Bridge vs Router (Full Detailed Example)
- 44 First port your computer hits
- 45 The Beauty of the Internet Protocol
- 46 This tool is neat
- 47 DNS is beautiful
- 48 Why 0177.0.0.1 is also localhost
- 49 Software Engineering and Nursery Rhymes
- 50 UDP hole punching | The Backend Engineering Show
- 51 This project could free millions of IPv4 addresses, but is it worth it?