-
Splitting hairs^H^H^H^H^H strings with Java
Offtopic: where does ^H come from? (since I too found it only recently) – from the source of all wisdom – Wikipedia :-p Pressing the backspace key on a computer terminal would generate the ASCII code 08, BS or Backspace, which would delete the preceding character. That control code could also be accessed by pressing…
-
The future of web hosting
I find myself thinking more and more about (a possible) future of the web. While the current system for web hosting works pretty well (and I am the first to say that we shouldn’t make the perfect an enemy of the good), it would be really nice to exploit more of the potential in the…
-
Best web hosting?
There is a lot of talk out there about which is the “Best Web Hosting” company. With such a highly contentious subject (since being the “best” means more customers – and implicitly more money), there are a lot of “authoritative sources” out there. One authoritative (without quotes!) source would be Netcraft, but then again, their…
-
Donating to the Haiti earthquake relief effort
Cross-posted from the TwitFeeder blog. You might also want to check out the Options for giving post, which enumerates more organizations you should consider donating to (not related to the Haiti earthquake). As most of you probably already know, the Republic of Haiti has been hit by a catastrophic earthquake. Please donate to the organizations…
-
delicious/cdman83
Vista automatic updates have deleted all of the data on my desktop. Posted: 25 Dec 2009 08:37 AM PST I love "Indian-English": By doing automatic updates you want lose the Data saved on the system. net toolkit::index Posted: 31 Dec 2009 04:28 AM PST Appendix G: Windows Update Agent Result Codes Posted: 31 Dec 2009…
-
An useful Ubuntu (online) resource
If you use Ubuntu, the full circle magazine is a great resource, go check it out. For example from the latest issue I’ve learned that I should install vim-nox on my servers if I want to upgrade my 1980’s experience to 1990’s :-). I there is one (small) issue, it is the fact that the…
-
Forensic analysis of JPEG images
Recently I became aware of the Hackerfactor blog, especially the posts related to discovering image manipulation. It is interesting to read what one can deduce from an image, even when one doesn’t use such “obvious” information sources like image metadata (I say “obvious” because it seems that it isn’t obvious at all for most people…
-
Security vendor’s “top-threat” list proof for their less-than-perfect performance?
Here is something I’ve been thinking about lately: most (all?) security vendors publish their “top-threats” periodically. Those lists are made up by centralizing numbers reported by their clients. While it is safe to assume that the majority of the enumerated threats are blocked straight-away – before they can execute a single piece of code –…
-
A missed opportunity
The theory of capitalism (and I’m greatly oversimplifying here, I know) says that, even is we all follow just our own self interest, a global “good” will somehow emerge. This is what F-Secure is doing in their blogpost where they write about a specific ransomware which – if you get infected with – encrypts your…
-
Announcing a couple of contests
Here are some contests I found: The Fifth Underhanded C Contest – the scope is to write benign looking code which would pass trough a code-review (and/or there is plausible deniability for the coder), but which does some evil things. Found it via slashdot. Some of the previous solutions are truly ingenious. From the Forensics…