The most massive crime of identity theft in history was perpetrated in 2007 by exploiting an SQL Injection vulnerability. This issue is one of the most common and most serious threats to web application security.
Extreme debugging - a tale of microcode and an ovenIt's been quite awhile since I debugged a computer program. Too long. Although I miss coding, the thing I miss more is the process of finding and fixing bugs in the code.
30 Weeks of Game DevelopmentOutland Games is an iOS game I’ve been working on at Uber Entertainment since late last summer. We just released the game to the app store this week (iTunes – $0.99). This post is the first in a short series on it’s development.
Daniel GrunwaldJust after the ILSpy 2.0 release, I started adding support for decompiling C# 5 async/await to ILSpy. You can get the async-enabled ILSpy build from our build server.
Yes, your code does need comments.I imagine that this post is going to draw the ire of some. It seems like every time I mention this on Twitter or anywhere else there is always some pushback from people who think that putting comments in your code is a waste of time.
20 Rules of Software ConsultingI'm going to be gradually republishing some of my older content from my prior blogs here so that people can find it again. I'll also be updating the stuff which needs updating, of course. Here's a revised and updated favorite: the "rules of software consulting".
It’s OK to rewrite applications from scratch (sometimes)You may have heard that rewriting an entire application is something you should never do. As usual, this is great advice 99% of the time.
Solving Problems Using Data StructuresTagged as: csharp, java. TL;DR: In this article I show how a data structure can be used to encapsulate implementation details and lead to nice clean code.
Breaking down Amazon’s mega dropdownThe hover effects on Amazon’s big ‘ole “Shop by Department” mega dropdown are super fast. Look’it how quick each submenu fills in as your mouse moves down the list: It’s instant. I got nerd sniped by this. Most dropdown menus have to include a bit of a delay when activating submenus.
Tek Tok Late NightTeam High Tech Crime van de politie breidt uit! Daarom bieden we je een exclusief inkijkje in onze jacht op high tech-criminelen. Op dinsdag 5 maart staat de spraakmakende liveshow in Den Haag in het teken van geavanceerde cybercrime.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.