I put together a very simplistic way to compare files. The code is not as fancy as diff or other tools, but it gets the job done.
Continue reading Java – simple file comparison
I put this small Java application together to list all the available MythTV recordings. It will print the title, subtitle, and location of the recording on the file system. It’s not much, but what the heck. Enjoy!
Continue reading Java – how to get a list of recordings for MythTV
I was told as a child to never accept candy from strangers, It’s no different as an adult. Emails, phone calls, and fliers, that offer deals that are just too good to be true are nothing more than adult candy. In this posting, I offer tips on how to stay safe while performing that one task that everyone does during the holiday season (and possibly year-round) – shopping. The article is lengthy, but hopefully it empowers you to be more aware of the attacks present online, and in “real life”, and how to better reduce the risks associated with online shopping.
In my travels through the Internet, I found the , Java Coding Standards and wanted to highlight one portion as a concern for application security. The standards (specifically section 3) make me think back to my earlier days of code development. One person I worked with actually said to me after reviewing my code, “This makes my eyes hurt.” Now, as time has passed and my ability to code to standard has improved, I now get complements from the same person who’s eyes had hurt years ago after looking at my code.
PII (personally identifiable information) is data, when associated with other data, identifies information associated with a single person. Some obvious data associated with a single person include a full name, Social Security Number, driver’s license number, birthday, and birthplace.
I had the opportunity to attend a training session on the CSSLP Body of Knowledge back in December, 2010. It was an overview on the Certified Secure Software Lifecycle Professional certification exam. The first part of the training is something every ‘Net-savy person should know and understand when talking about information security.