Some personal and shared stuff Saturday, 24 March 2018 - 1:39

Tag Archives: IT

Data Encapsulation

Data Encapsulation - Dilbert by Scott Adams

Severe WiFi security flaw puts millions of devices at risk

by: Steve Dent

Researchers have discovered a key flaw in the WPA2 WiFi encryption protocol that could allow hackers to intercept your credit card numbers, passwords, photos and other sensitive information. The flaws, dubbed “Key Reinstallation Attacks,” or “Krack Attacks,” are in the WiFi standard and not specific products. That means that just about every router, smartphone and PC out there could be impacted, though attacks against Linux and Android 6.0 or greater devices may be “particularly devastating,” according to KU Leuven University’s Mathy Vanhoef and Frank Piessens, who found the flaw.

Here’s how it works. Read more »

Finishing software

Software Is Never Finished  - Dilbert by Scott Adams

Everything I need to know is on the internet

 - Dilbert by Scott Adams

Goodbye, Object Oriented Programming

Charles Scalfani

I’ve been programming in Object Oriented languages for decades. The first OO language I used was C++ and then Smalltalk and finally .NET and Java.

I was gung-ho to leverage the benefits of Inheritance, Encapsulation, and Polymorphism. The Three Pillars of the Paradigm.

I was eager to gain the promise of Reuse and leverage the wisdom gained by those who came before me in this new and exciting landscape.

I couldn’t contain my excitement at the thought of mapping my real-world objects into their Classes and expected the whole world to fall neatly into place.

I couldn’t have been more wrong. Read more »