Android Security Overview
Thats the way, Android core security is built. Quite interesting (see [1]).
[1] http://source.android.com/tech/security
Thats the way, Android core security is built. Quite interesting (see [1]).
[1] http://source.android.com/tech/security
Some weeks ago I’ve received a neat email claiming to come from the Postbank Team. Despite the fact that I am NOT a customer of Postbank, the mail was quite badly assembled. There were so many typos in the email, that it is unlikely for such a mail to origin from Postbank. Have a look…
Introduction Scrum is a well-known agile software development methodology. As usual, I bought this book in my local book store before boarding the plane to the United States. I enjoy reading books while travelling. This was the perfect setting to read this book. Contents If you’re new to Scrum, this book is a good place…
For the last few weeks I was busy programming my DNSNINJA [1] tool. During my tests I came accross an issue related with shared libraries under Linux. Therefore, I’ve decided to investigate a little bit further on this issue. A good read on the concepts behind shared libraries can be found unter [2], a page…
Hashdays, I’ll come! Just bought my ticket to this awesome conference, happening in Lucerne each year (see [1]).Beneath all the technical talks, I’m relly looking forward to attending the well-established hashdays party friday evening. Just in case you read this post, drop me a comment. We’ll see us at the con!
[1] http://www.hashdays.ch
See what funny Outlook invitations I receive all over the day 😉 I like! *looool* WTF. 😀
In some situations you need to debug your signal handler code. When using gdb, you soon notice, that gdb’s default behaviour is to consume the signals itself. you can change the default behaviour by issuing the following command as an example: (gdb) handle SIGINT pass This instructs gdb to pass over the signal to your…
I know, this is in some way a rather religious topic, but I was interested in how to properly code C and in how to handle variables and variable-passing to functions in a clean way. After doing some research I come to the following conlcusion. When Writing Non-Multi-Threaded Programs Below are my personal recommendations when…
Look at this picture of an image I’ve found hyperlinked on Bruce Schneier’s Blog. It seems as it was absolutely impossible to find a better background for the interview. *LOOOOL* and EPIC FAIL.
[1] http://www.frontlinesentinel.com/2012/05/mlb-security-fail-lol-worthy.html
[2] http://www.schneier.com
While checking my mails, I’ve found a funny link to Yakov Fain’s Blog, where he outlines what you shouldn’t bring to an IT conference [1]. Quite funny to read. Thanks for the contribution 🙂
[1] http://yakovfain.com/2012/04/18/what-not-to-bring-to-an-it-conference/