Channels ▼

Blogs

August 01, 2014

A Second Try at Refactoring Dijkstra's Example

If you compare my code with Dijkstra's original solution, you will see that in an odd way they are nearly logical duals of each other.

July 29, 2014

Simple Digital

It seemed a waste to put an I/O board in the system just for one switch closure reading.

July 25, 2014

CRC: The C Stands for Confusion

Because it is so often abstracted, people don't always make smart choices about selecting and specifying CRCs.




Security Source Code

ciphter.txt

September 24, 2008

Published source code accompanying the article by Dejan Ristanovic and Jelica Protic in which they examine the Book Cipher algorithm which uses letters of subsequent words in some text or book as a key to encode messages. - Security

Associated article: The Book Cipher Algorithm

Tags: Global Developer     Web Development     .NET     Security     C/C++     Tools     Open Source     Parallel     JVM Languages     Design    



safecode.txt

September 18, 2008

Published source code accompanying the article by Gwyn Fisher in which he examines several types of coding vulnerabilities and examines how you can mitigate the risk of exploit within your Java, C, and C++ code. - Security

Associated article: Safe Coding Practices

Tags: Global Developer     Database     Web Development     Security     C/C++     Open Source     JVM Languages     Design    



vista.zip

September 05, 2007

- Security

Associated article: Inside the Windows Vista Disk Encryption Algorithm

Tags: .NET     Security    



vcrypt.txt

September 05, 2007

Published and unpublished source code accompanying the article by Daniel Stoleru in which he examines Bit-Plane Complexity Segmentation which lets you embed large amounts of data in images. - Security



obol1.txt

September 06, 2006

Published source code accompanying the article by Per Harald Myrvang in which he presents Obol, a Lisp-like, domain-specific language for testing and experimenting with when constructing and using security protocols in real systems. Also see OBOL2.ZIP and OOBOL.ZIP. - Security

Associated article: Parameterized Communication

Tags: Web Development     .NET     Security     C/C++     Open Source     Embedded Systems     JVM Languages     Design    



device.txt

June 30, 2006

Published source code accompanying the article by Ziv Gutterman and Avner Rosenan in which they examine how modern hardware devices contain information that assists the operating system in finding appropriate drivers--and intruders in finding out who was doing what when. - Security

Associated article: Device Trails

Tags: .NET     Security     Embedded Systems    



secure.txt

May 16, 2006

Published source code accompanying the article by Robert Seacord in which he ports C++ programs to C++/CLI to see if they're still susceptible to buffer overflow vulnerabilities. 2 - Security

Associated article: Secure Coding in C++/CLI

Tags: .NET     Security     C/C++    



viscrypt.txt

October 01, 2005

Published source code accompanying the article by Daniel Stoleru in which he examines Extended Visual Cryptography Schemes--graphical forms of information concealing. - Security

Associated article: Extended Visual Cryptography Schemes

Tags: Security          Design    



netcrypt.txt

December 01, 2004

Published source code accompanying the article by David B. Scofield and Eric Bergman-Terrell in which they examine the .NET Cryptography API. Also see NETCRYPT.ZIP. - Security

Associated article: Sensitive Data & the .NET Crypto API

Tags: .NET     Security    



scout.txt

November 01, 2004

Published data accompanying the article by Michael Larson in which he presents the ScoutSecure framework lets you monitor attacks on Wi-Fi (802.11) wireless networks. Also see SCOUT.ZIP. - Security

Associated article: The SecureScout Wi-Fi Security & Monitoring Framework

Tags: Security          Mobile    





Video