Programming Leftovers
-
Leon Mika ☛ On Go Interfaces And Component-Oriented Design
So I agree with the post but I come away from it wondering what an alternative to component design actually looks like. I’m still trying to figure this out, and it might be that I’ll need to read up on this some. But maybe it’s to take the idea of self contain units, and throw away the imagined idea of reuse. In concrete terms, ditch the interfaces and replace them with direct method calls.
-
Chen HuiJing ☛ Let's inspect a phishing site
The point of this post though, is because I just got a scam SMS and thought it’d be fun to inspect how the phishing website works. This might be a completely stupid idea but I’m not known for being smart about things, so here we go.
-
[Old] Liam Proven ☛ "A Plea for Lean Software" by Prof. Niklaus Wirth
The apparent software explosion is accepted largely because of the staggering progress made by semiconductor technology, which has improved the price/performance ratio to a degree unparalleled by any other branches of technology. For example, from 1978 to 1993 Intel's 80x86 family of processors increased power by a factor of 335, transistor density by a factor of 107, and price by a factor of about 3. The prospects for continuous performance increase are still solid, and there is no sign that software’s ravenous appetite will be appeased anytime soon." This development has spawned numerous rules, laws, and corollaries, which are—as is customary in such cases—expressed in general terms; thus they are neither provable nor refutable. With a touch of humor, the following two laws reflect the state of the art admirably well:
· Software expands to fill the available memory. (Parkinson)
· Software is getting slower more rapidly than hardware becomes faster. (Reiser)
Uncontrolled software growth has also been accepted because customers have trouble distinguishing between essential features and those that are just “nice to have.” Examples of the latter class: those arbitrarily overlapping windows suggested by the uncritically but widely adopted desktop metaphor; and fancy icons decorating the screen display, such as antique mailboxes and garbage cans that are further enhanced by the visible movement of selected items toward their ultimate destination. These details are cute but not essential, and they have a hidden cost.
-
Rlang ☛ Overview of clustering methods in R
Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group (called a cluster) are more similar (in some sense or another) to each other than to those in other groups (clusters).
It is a technique of unsupervised learning, so clustering is used when no a priori information about data is available. This makes clustering a very strong technique for gaining insights into data and making more accurate decisions.
-
Joshua Rogers ☛ SSH-Snake: Automatic traversal of networks using SSH private keys
To put it simply, SSH-Snake performs three basic tasks:
1. On the current system, find any SSH private keys,
2. On the current system, find any hosts or destinations (user@host) that the private keys may be accepted on,
3. Attempt to SSH into all of the discovered destinations using all of the private keys discovered.The interesting thing about SSH-Snake, however, is that it can perform all of these tasks recursively: once it connects to a new destination, it starts tasks #1-#3 again. It continues this into perpetuity; or until no new keys/destinations are found. It’s completely self-replicating and self-propagating – and completely fileless.
-
Peteris Krumins ☛ Can PDF Files Have Viruses? (And How to Avoid Them)
Yes, PDF files can contain viruses. These viruses are often embedded in the file and can be activated when the PDF is opened, exploiting vulnerabilities in PDF reader software. This can result in unauthorized system access, data breaches, or other cybersecurity threats. To safeguard against such risks, it's advisable to utilize a PDF sandbox, a secure environment that isolates and scrutinizes PDF files before opening them on your network.
-
Mandaris Moore ☛ Labarum: Can I has Cheeseburger and Debugging
In my last post about the labarum theme, I ranted about how I wasn’t going to re-invent the wheel. In this post, I’ll be talking about how I made some minor tweaks and decided to update the version to 1.3!
This post is mostly a “why did I do this” versus a “how did I do it”.
-
SaaS/Back End/Databases
-
Ruben Schade ☛ MariaDB versus PostgreSQL, and dual-stacking
Two heavyweights have long stood out in the battle for the world’s preeminent open-source database. That would be Berkeley DB and SQLite. Or is it Vim and Emacs? To select one for a task isn’t to evaluate two systems against your requirements, but to commit your system to The Ordained One. Flame wars of the kind that say one sucks over the other, with all the subtlety of a dropped table in a china shop, are all but inevitable when the discussion comes up on social media, forums, or technical Q&A sites.
-