Tag Archives: best practices

Hacking skills as determined by a politician

Words have meaning and it is a bit disturbing when you read an article or see a speech where they are being incorrectly used. The most recent example of this is how people use or refer to technology. When computers … Continue reading

Posted in programming, security | Tagged | Comments Off on Hacking skills as determined by a politician

Chasing the little green lock

I wanted for the longest time to both convert this blog from http to https. Computers are ever more powerful and my site is pretty simple – it should not have been a big deal.  Not only that but with the … Continue reading

Posted in programming, security | Tagged , , | Comments Off on Chasing the little green lock

command line fun – finding security problems with find

I cannot actually remember how it happened.  I wasn’t paying enough attention and was viewing one of my scripts on production.  When I was finished I did what I always do in vi – I exited the script using : … Continue reading

Posted in Command line | Tagged , , , | Comments Off on command line fun – finding security problems with find

Maven simple example

Maven was briefly described in my previous post.  In this post I will do a few small examples for actually using Maven. One of the main things about Maven is the idea of the artifact.  The artifact is a file, which … Continue reading

Posted in programming | Tagged , | Comments Off on Maven simple example

Maven the alternative build tool

Why maven Maven is a tool for building software. Doesn’t there already exist a number of tools for doing this exact task?  Two different tools that do this are the classic make utility or the much newer Apache Ant. The make utility … Continue reading

Posted in programming | Tagged , | Comments Off on Maven the alternative build tool

enhancing the privacy we still have

Is privacy is simply too much work? The problem is not that technology cannot help out but in my case it seems that I am constantly installing or setting up new computers or virtual machines and there is never the … Continue reading

Posted in security | Tagged , | Comments Off on enhancing the privacy we still have

Security in homogeneous systems

The Central Intelligence Agency (CIA) has been quite industrious in creating a new way[1] of tracking documents that could be “borrowed” from a person, business or government against the will of of that entity. This new document protection is the … Continue reading

Posted in security | Tagged , , | Comments Off on Security in homogeneous systems

Is Agile development the Emperors new clothes

I had the opportunity to take a class on Agile development recently, Scrum, and it was a fascinating way of doing development. I have been pretty lucky over my career that I have not been dragged through a lot of … Continue reading

Posted in Soapbox | Tagged | Comments Off on Is Agile development the Emperors new clothes

Machine generation of PDF files the easy way – final piece

This is essentially a refinement of the previous steps. I have added a lot of new list data but instead of being limited to what political party they are in or even if they like to party, I have extended … Continue reading

Posted in programming | Tagged , , , | Comments Off on Machine generation of PDF files the easy way – final piece

Machine generation of PDF files the easy way – part VI

The entire example report up until this point has been nice with a cool feature or two but terribly unrealistic. It is important to have the data in mind when creating the form but the form that I have created … Continue reading

Posted in programming | Tagged , , , | Comments Off on Machine generation of PDF files the easy way – part VI