A blog about current topics in computer science and media, maintained by students of the Hochschule der Medien Stuttgart (Stuttgart Media University).
Recent Posts
How are vulnerabilities exploited to compromise a system?
This article is a recap of the “Live Hack” presentation, held in the lecture “Sichere Systeme” in SS 2020. It will introduce different vulnerabilities like XSS and SQL-Injection and shows how passwords can be cracked under certain circumstances. The last step explains how a SUID binary was exploited to gain root access on the target…
Behind the scenes of modern operating systems — Security through isolation (Part 1)
In recent years, since the Internet has become available to almost anyone, application and runtime security is important more than ever. Be it an (unknown) application you download and run from the Internet or some server application you expose to the Internet, it’s almost certainly a bad idea to run apps without any security restrictions…
System Theory and an Introduction to Complexity
This article gives an introduction to some important aspects of system theory and system analysis. We present some frameworks and toolsets used for system analysis and summarize some key points of these tools. The article aims to show some of the complexity behind system analysis and why there often is no simple solution. It then…
Stromnetze
Strom wird für fast alles benötigt. Von Computern und Servern, welche ausfallsicher laufen sollen um den Nutzern zuverlässig ihren Service bieten zu können, bis hin zu Wasserpumpen und Medizinischen Geräten, die die Grundversorgung bereitstellen und das Überleben sichern – ein Ausfall dieser Infrastruktur ist daher sehr ungünstig. In diesem Beitrag geht es um mehrere Aspekte…
Finding the right strategy for your way to the cloud
– Abstract – This article is about finding the right strategy if you want to empower your business with cloud computing. It’s written for those of you who are still new to this topic and want to get a first sight through the dense cloud mystery. After reading you should have gained an orientation on…

Fake news with reference to information warfare
Through networking and the Internet, more and more people can share their opinions and spread news. This has positive and negative consequences. On the one hand, it is much easier to get the news you want and to publish it. On the other hand it is relatively easy to influence other users. An insight into…
Corona Warning App
In 2020 many things are different. People work and study from home, wear face masks and are facing restrictions in their fundamental rights. These measures and restrictions were taken to bring the global pandemic under control. More than 800.000 people have died as a result of Covid-19 (SARS-CoV-2) (25.08.2020). “Let’s build an app for it”…
The financial system
Everyone interacts with it, often on a daily basis, everyone is part of it and everyone will suffer from the consequences of a crisis hitting the system, but only few reap the benefits. The financial system has become huge and ominous, it is hard to understand how it works or even fully comprehend it. This…
The Dark Side of AI – Part 2: Adversarial Attacks
Find out how AI may become an attack vector! Could an attacker use your models against your? Also, what’s the worst that could happen? Welcome to the domain of adversarial AI!
Buzzwords
AI Amazon Web Services architecture artificial intelligence Automation AWS AWS Lambda Ci-Pipeline CI/CD Cloud Cloud-Computing Cloud Computing Containers Continuous Integration deep learning DevOps distributed systems Docker Enterprise IT Git gitlab Gitlab CI ibm IBM Bluemix Jenkins Kubernetes Linux loadbalancing machine learning Microservices Monitoring Node.js Python scaling secure systems security serverless social media Sustainability System Engineering and Management Terraform Test-Driven Development ULS ultra large scale systems Web Performance
