-
Google Reader, Javascript and Flash
I had the idea some time ago to highlight the source code I post via Javascript. I gravitated towards this solution because I don’t have source level control of Blogger (or do I? ;-)). My thought process was the following: include one .js in each post, which will check if the customization was already done…
-
Malware challenge results are out
The contest results are out. I scored way below my expectation and – after reading a few submissions from the top half of the list – I can’t really tell what the reason for it is :-(. (Not that it matters all that much – given that I wasn’t eligible for prizes anyway – it’s…
-
Is Vista really safer?
I keep reading articles like this: Security – One of The Key Reasons to Migrate to Windows Vista (other articles from this category are for example one which breaks down the MS Malicious Software Removal Tool statistics by versions of Windows to conclude the same thing). The problem with these? They fail to account for…
-
Free AV from Microsoft
It seems like Microsoft is dropping their OneCare product line and repackaging it as “Morro”, a free consumer AV product. I read the news on Graham Cluley’s blog. What does this mean? This will of course eat from the pie of other vendors offering free products (AVG, Avira and Avast!). It will also get more…
-
Opinions about whitelisting
I was reading the piece entitled White Listing – The End of Antivirus??? by the “Director of Technical Education”. Now it would be fairly easy to do ad-hominem attack against him, I will stick to the technical details of the post: First, it gives the argument that one of the approaches whitelisting companies use is…
-
Firefox 2 end-of-life
Via Slashdot came the news that version 1.8 of the Gecko engine used to render HTML in Firefox 2, Thunderbird 2, etc. was being end of lifed. Now I have still a few computers which I’m responsible for that have FF2 on them, just because that’s what the users were accustomed to. So I searched…
-
Ethical hacker challenge solution
Given that the deadline passed, I’ll publish my solution to the Scooby Doo Ethical hacker challenge. In related news (via SANS): the November challenge from packetlife. The deadline is the 20th of November, so hurry up. Can you figure out who killed Dr. Wilson, and why? I would say it was Dr. Miller. In the…
-
Dynamic or static typing?
Working is Java (Eclipse more precisely), I came to value very much the features which it offers related to exploring / manipulating the source code. I’m talking about things like “take me to definition”, “show me where it is used”, refactoring features, etc. This made me thinking: isn’t really the difference between static and dynamic…
-
Vendor included backdoors
An other reason to make sure that you use your available software to the maximum extent before going out and deciding to remediate your software problem with more software 🙂 Vendor included backdoor can appear for multiple reasons, but there are two big categories: “Easter-egg” like feature (some programmer decided to put in a piece…
-
Calculating the intersection of two Java sets
This is my simple stupid Java tip for the day: to nondestructively calculate the intersection of two Set’s (ie, retain both object), do the following: Set intersection = new HashSet(s1); intersection.retainAll(s2); Taken from Java Tutorials. Lessons learned: before implementing code which even vaguely seems that it should already exists, check with your favorite search engine.…