Month: July 2016
Defense in Depth: a present time example
In this post, we want to take a look on the concept of defense in depth. Therefore we are going to examine Chrome OS, the niche operation system for web users.
- Allgemein, Cloud Technologies, Scalable Systems, Student Projects, System Designs, System Engineering
SocialCloud – Is it nice to organize?! – Part 2
In every job interview, sooner or later there will be the important question: Can you tell us about your teamwork skills? The importance of teamwork is continuously increasing in the IT world and coding geeks sitting in a dark basement are outdated.
Security aspects in the context of drones
Image you are sitting on your balcony after a stressful working day. Your legs on a chair, an ice cold beer in your hand and the afternoon sun on your face. Suddenly the light darkens and a soft buzz is filling the air, constantly getting louder and more annoying. A cold breeze causes goosebumps on…
SocialCloud – Ideas, Ideas and Ideas?! – Part 1
“Well, I am currently working on a system that will stop my cats from entering through the cat flap if they are carrying a dead mouse. – Do you guys have any private projects you would like to work on within this seminar?” – Thomas Pohl, lecturer and cat owner As a student being…
Rust – fast and secure
Rust, a fairly new programming language promises to be fast and secure. The following blog entry discusses how Rust tries to achieve these two goals. The key concept is that every resource always belongs to exactly one variable. More precisely one lifetime, which is normally automatically created on variable creation. The concept of lifetimes would…
IT-Security in film and fiction
Probably everybody with a background in computer science has already seen a hollywood blockbuster or read a critically acclaimed book which alluded IT-security. It is a popular topic which allows to play with the expectations and fears of the audience. Government agencies are hacked within seconds, security failures happen everywhere, destructive malware infects machines on…
The new CI world, Wrapping it up with Git
Nowadays many agile teams work with Git and Feature Branches. A developer works with on a feature and at the end he merges the new feature’s code into the project. However, this concept goes against the principles of CI. Let’s take a closer look at this practice and find out if the concepts of version…
Incognito in the dark web – a guide
“Big Brother is watching you”, “data kraken” or “the transparent man” are often used as catchwords, when talking about the shrinking privacy on the internet. This blog post will how a possible way of protecting the anonymity and privacy of the users in the internet. A possible way to do so, is to access the…
How is XSS still a thing?
Back in 2005, the words ‘But most of all, samy is my hero’ caused great agitation among MySpace engineers as Samy Kamkar injected a Cross Site Scripting (XSS) worm into the social network. The attack consisted in an infected user, publishing a post in their myspace page showing these words honoring its creator, and of…