Fork me on GitHub
  1. About Java...

    Java is the COBOL of today.

    It is a language often used in education (fortunately nowadays Python is taking over there), but this just means that we have lots of “Java Programmers” with zero experience. And the only thing worse than a bad programmer is a bad programmer who thinks …

    Read more...


  2. Passwords Are BAD

    Password are awful.

    Unfortunately, it is the "least worst" solution to the problem of authentication in most cases.

    Sure, there are lots of other authentication methods out there, each with their own problems which (on balance) usually ends up being worse:

    Read more...


  3. Why So Many Passwords?

    Every site (or every account) you use should have a different, distinct password. Every single one. Never re-use passwords.

    That way: if one site gets hacked (and your password leaked on the darker parts of the web), only that account is leaked. The potential damage is reduced. The bad guys …

    Read more...


  4. I will stop spamming you!

    The spammers who try to flood my inbox must be getting desperate - they're offering to stop if I pay them!

    From: "Admin" <admin@secureserver.eu>
    Subject: I will stop spaming you
    
    I'm sick of sending spam...
    
    If you send me $10 USD worth of XMR / Monero I will remove …

    Read more...


  5. Blurple!?? Really?

    The other day I came across a new English word. This is not a new thing for me - it happens on a annoyingly regular basis. But it made me stop and take notice: BLURPLE !?? Why hadn't i ever heard that before?

    OK - so it sounds some combination between blue and …

    Read more...


  6. Recovering From A Fork Bomb

    The scenario: Your server is not working right: You cannot start new processes! Simple commands like "ls" fail:

    yourname@yourserver:~$ ls
    -bash: fork: retry: Resource temporarily unavailable
    

    This is a symptom of the kernel reaching the maximum number of processes. On most systems, this is 32768 processes, and on 64-bit …

    Read more...


  7. Files Hidden By Mount Points

    The wolderful flexibility of being able to mount file systems at any point in the file system comes at a small cost: You can end up hiding files - usually by mistake.

    For example, imaging having the following file systems:

    • / - the root file system. A small(ish) partition, usually only a …

    Read more...