Rob Janssen

All | Unread | Read

www.suspekt.org/wp-content/uploads/2008/09/lesserknownsecurityproblemsinphp

Detecting duplicate images using Python

With thousands of icons being uploaded to Iconfinder.com every month, the risk of pirated content also increases. To keep out the swindlers we have been working on a new clever image duplication technique.

Why You Might Want to Store Your Passwords in Plain Text

UPDATED April 2, 2014: This was an April Fools Joke. Read. Laugh. Learn. And don’t store your passwords in plain-text. It’s a horrible idea. As Stormpath is a security company, specifically focusing on user management — we often get questions about password hashing, database security, etc.

CODETUNES · Fixing legacy code

There’s a red alert in your mailbox and you know exactly what it means - the system is down and you have a 500 error on a specific action. Your response is clear - you find the bug and fix it as fast as you can.

How to Correctly Detect Credit Card Type

Most card type detection tutorials and libraries use regular expressions without references, often omitting or incorrectly detecting card types. This guide explains the card type detection process, cites sources, and analyzes the detection algorithm and user interface of Creditcard.

Cron in production? That is a double edged sword!

Cron is a unix tool for launching processes at given time intervals. It is incredibly useful, but the dangers that it presents can often be overlooked when selecting it as a solution.

Analysis Paralysis: Over-thinking and Knowing Too Much to Just CODE

Lately, I've been noticing that the more experience I gain, the longer it takes me to complete projects, or certain tasks in a project. I'm not going senile yet. It's just that I've seen so many different ways in which things can go wrong.

The strangeness of scale at Twitter

When hundreds of thousands of Tweets are fired every second, a one-in-a-million chance -- including unlikely sounding scenarios that could harm users -- happens about 500 times a day. For Del Harvey, who heads Twitter’s Trust and Safety Team, these odds aren’t good. The security maven spends her days thinking about how to prevent worst-case scenarios while giving voice to people around the globe. With deadpan humor, she offers a window into how she keeps 240 million users safe.

Class Hierarchies? Don't Do That!

In theory, JavaScript does not have classes. In practice, the following snippet of code is widely considered to be an example of a “class” in JavaScript:

Refactoring With LZ77: Compression Is Compilation (?)

This post was written under the influence of coffee ice cream and espresso. It’s a magical drink ;) I don’t really follow the compression scene, and only pay minimal attention to machine learning. Nevertheless, the “Compression is Learning” slogan feels more and more right to me.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.