When I was a young coder, just starting out in the big scary world of enterprise software, an older, far more experienced chap gave me a stern warning about hard coding values in my software.
The Absurdly Underestimated Dangers of CSV InjectionI’ve been doing the local usergroup circuit with this lately and have been asked to write it up. In some ways this is old news, but in other ways…well, I think few realize how absolutely devastating and omnipresent this vulnerability can be.
Floating point numbers made simpleBased on a great post by Fabien Sanglard, over at http://fabiensanglard.net/floating_point_visually_explained/, I figured I should add some more information about floating point numbers. The information is universally applicable to any programming language and comes in handy in many weird cases.
SimpleCV - Computer Vision using PythonKatherine ScottThis talk is a brief summary of Computer Vision tutorial we proposed for PyCon. In this talk we will discuss what computer vision is, why it's useful, what tools exist in the Python ecosystem, and how to apply it to your project. T
A Digital Media Primer for GeeksThis first video from Xiph.Org presents the technical foundations of modern digital media via a half-hour firehose of information. One community member called it "a Uni lecture I never got but really wanted."
Digital Show & TellContinuing the "firehose" tradition of maximum information density, Xiph.Org's second video on digital media explores multiple facets of digital audio signals and how they really behave in the real world.
Passwords Evolved: Authentication Guidance for the Modern EraIn the beginning, things were simple: you had two strings (a username and a password) and if someone knew both of them, they could log in. Easy. We're talking back in the 60's here so a fair bit has happened since then.
How to securely hash passwords?If I hash passwords before storing them in my database, is that sufficient to prevent them being recovered by anyone? Of course any form of hash will not prevent those attacks.
My Logging PracticesThere are many classic tech debates, and the question of what to formally call web addresses is one of the most nuanced. The way this normally manifests is someone asks for the “URL” to put into his or her browser, and someone perks up with,
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.