-
A (not so new) technique for breaking databases
There is joke which goes something like: those who know how to do it, do it. Those who don’t, teach it. Those who don’t even know how to teach it, supervise it. Sadly this is true for many tech journalists who make up sensationalized titles both because of lack of comprehension and because they have…
-
You must be ye high to play
I would be for my readers indulgence, but here is an other philosophical post. Recently I had the chance to try to teach somebody make dynamic websites and I realized that you must know an awful lot to do this. Just to enumerate a couple of things: (X)HTML CSS – which is by no means…
-
All the perl documentation
A quick note: When I talked earlier about turning off warnings in Perl, I referenced the perldiag page. If you wish to see a list of all the perl… documentation available, you can look at the language reference at perldoc.perl.org (there is also a 5.8.8 version if you haven’t upgraded yet, although the differences should…
-
Visualization techniques for networking data
This is the HTML version of a paper I’ve written for school. Sorry for the poor formatting, but it was generated (semi-)automatically with Google Docs from an ODT document. You can download a nicer, PDF version of it here. Introduction Humans have a natural ability to correlate patterns from multiple sources to become aware of…
-
Who are behind the RaceToZero contest?
The RaceToZero has captured the publics imagination (or shall I say the medias) as the latest member of the AntiVirus is dead movement. As I tried to explain in my previous post, the results of the game are rather predictable (no detection after 5 minutes) unless the organizers are really mean (giving the contestants a…
-
Avoiding the dogpile effect
When using caching to speed up webpages (or other request-response oriented protocols), it is very common to tie the update of the cache to a new request, meaning that every request checks if the cache is too old first. If not, it returns the value from the cache. If it is, it tries to recompute…
-
Why prevention (rather than cure) is a must for the malware problem?
Lately I have seen a movement towards the idea that you can’t prevent security problems, so you should do your best to detect and eliminate them. While I agree with this in the general sense, it is clear that a very strong tendency in malware evolution nowdays is to make it both as stealth as…
-
On IP, the Universe and everything
I’m getting old or something, because I seem to rant more an more. Much of this text is contained in an e-mai sent to the .NET Rocks podcast regarding their OOXML show, but I thought it might be interesting to publish it here to clarify my views on IP, OSS, the universe and everything 🙂…
-
Having fun
Via the Hacker Webzine blog (yes, I’m challenging all the security gods by linking to the blog which social engineered people in giving their passwords just for fun – so take care): The Interesting Hacks To Fascinate People: The MIT Gallery of Hacks Also on that page I found the engineers drinking song: Lyrics can…
-
My Perl blog – how to turn off warnings
There seems to be a meme going around which encourages blogging about Perl. So here is my contribution: When you write scripts, it is really, really recommended to use the strict and warning pragmas (eventually diagnostics): use strict; use warnings; use diagnostics; #mainly for debugging, to better understand the messages I can’t tell you how…