Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Figure



  SQL Injection through HTTP Headers

During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and whic...

   Code security,SQL injection,HTTP header     2012-04-05 11:42:04

  Tricks with Direct Memory Access in Java

Java was initially designed as a safe managed environment. Nevertheless, Java HotSpot VM contains a “backdoor” that provides a number of low-level operations to manipulate memory and threads directly. This backdoor – sun.misc.Unsafe â€“ is widely used by JDK itself in packages like java.nio or java.util.concurrent. It is hard to imagine a Java developer that uses this backdoor in any regular development because this API is extremely dangerous...

   Java,Directly memory access,Tricks,JVM     2012-02-13 05:31:19

  Why Emacs?

PreludeIf you are a professional writer – i.e., if someone else is getting paid to worry about how your words are formatted and printed – Emacs outshines all other editing software in approximately the same way that the noonday sun does the stars. It is not just bigger and brighter; it simply makes everything else vanish.Neal StephensonIn the Beginning … Was the Command LineI’m an Emacs user and I’m proud of the fact. I know my reasons for using it (and loving i...

   Emacs,Linux,IDE,Editor,Usage     2011-11-21 10:22:05

  Go vs C benchmark. Could Go be faster than C?

During last semester I was attending Multiprocessor Architectures course, given at Facultad de Informática where I study my Computer Science degree. As part of the assignments due to pass the course, we had to do several programs written in C to benchmark matrix multiplication by testing different techniques and technologies. First of all we had to do a secuential program in three different versions: A normal one where the result matrix is ordered by rows and the loops range the matrix by ...

   Gp,C,Benchmark,Faster,Speed,Comparison     2012-02-08 10:09:07

  Kicking ass together: How to improve coding skills as a group

Over the last year and a half, I have worked with a small group of students and staff to create an excellent online learning community at Mendicant University. Unfortunately, because Mendicant is something that we’re intentionally scaling at a very slow pace, we won’t directly reach as many people as we’d like to any time soon. In this post, I’ve collected some of the things that I think contribute to making Mendicant University a great place to learn. I’d love...

   Code skill,Group,Improvement,Efficiency     2012-01-31 23:59:33

  Native Audio with HTML5

Once upon a time, audio on the web lived primarily in the world of third-party browser plug-ins like Flash, QuickTime and Silverlight. This was not a bad world, but it had its issues.For one, most plug-ins require the user to install them, but not all users are willing (or able) to install them. Also, many players built with these plug-ins are inaccessible, making it difficult for folks who use assistive technologies to access the audio or alternative content.Then there are the front-end design ...

   Audio,HTML5,Built in,Audio tag,Video     2011-10-13 13:04:07

  The Greatest Developer Fallacy Or The Wisest Words You’ll Ever Hear?

"I will learn it when I need it"! I've heard that phrase a lot over the years; it seems like a highly pragmatic attitude to foster when you're in an industry as fast-paced as software development. On some level it actually IS quite pragmatic, but on another level I am annoyed by the phrase. It has become a mantra for our whole industry which hasn't changed said industry for the better. The problem is this, in the guise of sounding like a wise and practical developer, people use it as an exc...

   Tips, Programming, Expert     2011-04-06 11:07:43

  Why Every Professional Should Consider Blogging

I often argue that professionals should share their knowledge online via blogging. The catch is that virtually anything worthwhile in life takes time and effort, and blogging is not an exception to this statement. So before committing your energy to such an endeavor, you may rightfully stop and wonder what’s in it for you. Is blogging really worth it? In this article, I briefly illustrate some of the main benefits that directly derive from running a technical blog. 1. Blogging can impr...

   Developer,Blogging,Share knowledge     2012-01-29 04:30:07

  The Mature Programmer

1. The Mature Programmer The mature programmer manages their own time and productivity well. The MP knows that maintenance is as much work as the initial writing and code always takes longer than you think. The MP knows that any changes to code can introduce bugs, no matter how seemingly trivial. The MP knows that premature optimization is foolish and dangerous. The MP knows that sexy coding like writing big complex systems from scratch is rarely the best way to go. The MP does not get...

   Mature programmer,MP,Feature,Coding standard,Efficiency     2011-12-05 13:12:00

  Steve Jobs attacks Android just for show?

Steve Jobs has a famous statement which says Android is a stolen product. What does Google CEO Larry Page think about this statement? Recently, Page said in an interview with Bloomberg Businessweek that Apple hates Android just for show. He believes people should not look only to the competitions, but should focus on the potential cooperation opportunities to make the world better.The following is overview of the interview:Q: When you took over as CEO, one of your goals was to take the cle...

   Steve Jobs,Android,Larry Page     2012-04-08 08:30:33