Processes

We all encounter once in a while people in the teams who really love processes. Now processes are a good thing, because they can help us to work, clarify certain things and improve efficiency. There are even processes that are absolutely mandatory, for security reasons, for example. It should be carefully chosen where to impose …

Share Button

JSON instead of Java Serialization: The solution?

We start recognizing that Serialization is not such a good idea. It is cool and can really work on a wide range of objects, even including complex and cyclic reference graphs. And it was essential for some older Java frameworks like EJB and RMI, which allowed remote access to Java objects and classes. But it …

Share Button

Devoxx UA and Devoxx BE 2019

In 2019 I visited Devoxx UA in Kiev and Devoxx BE in Antwerp. Traveling was actually a little story by itself, so for now we can just assume that I magically was at the locations of DevoxxUA and DevoxxBE. In Kiew I attended the following talks: Probabilistic data structures in nutshell (in Ukrainian) [Oleksandra Kulyk] …

Share Button

Can hashCodes impose a security risk?

This may come as a surprise, but attackers can assume that software is running in one of the common languages with their standard library. This calculates the hashcode of a string in a predictable way. For that reason it is possible, to create a large number of entries that result in strings having the same …

Share Button

www.it-sky-consulting.com now https only

I have converted my company site www.it-sky-consulting.com to always use https. This is something all sites should do in the next few months.

Share Button

Weird blackmailing via email from „Hacker“

I got a few emails, that looked like this (see at the button). I replaced all references to myself with xxxx. The source of the email indicates, that a mailserver „nmail.brlp.in“ has been used for this. The fact, that the email seems to come from my own mail address is not a proof that this …

Share Button

Encryption of Disks

Today we should use encryption of disks for many situations. I recommend at least encrypting disks of portable computers that contain the home directory and portable USB disks. They can easily get stolen or lost and it is better if the thief does not have easy access to the content. We should even consider encrypting …

Share Button

Hidden CPUs

How many CPUs does your computer have? If we go way back, we will discover that some time ago there were already ancillary CPUs in our computers. The floppy disk drive of the C64 had a CPU very similar to the one in the computer itself, but very little memory and it was hard, though …

Share Button

Source Code of Apple-iOS leaked

It seems that the parts of the source code of Apple’s iOS 9 have leaked via github. They might have been removed from there, while you are reading this, but probably they will be passed around in the internet anyway. Some sources say that this is a risk to security. It might be, but in …

Share Button

The magic trailing space

When comparing string, of course spaces count as well and they should count. To ignore them, we can normalize strings. Typical white space normalization includes the following (Perl regular expressions): /[ \t]+/ /g replace any sequence of tabs and spaces used to separate content by one space. /\r\n/\n/g replace carriage return + linefeed by linefeed …

Share Button