Tags

java

CWE 1236 fix

less than 1 minute read

https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...

Exceptions

1 minute read

Exceptions In Java, you can to a lot with exceptions. You should use and handle exceptions the same way in your project. The mess starts when you mix differe...

Composition over inheritance

less than 1 minute read

I learned in 2007 in computer science class to use inheritance to achieve polymorphism-like behaviour. You just need to build a good inheritance tree to abst...

Builder pattern in Java

less than 1 minute read

Shows how to create an immutable object (Solution by Joshua Bloch from effective java)

Back to Top ↑

clean-code

Exception versus ResultWrapper

2 minute read

null versus ResultWrapper Example DataAccessObject Every project will have some kind of data access object. At some point you need to decide a pattern how yo...

Code smells

2 minute read

MagicNumbers/string Refactoring: Introduce constant with a meaningful name. But don’t over do it. If the constant is only used once, it might be better to le...

Exceptions

1 minute read

Exceptions In Java, you can to a lot with exceptions. You should use and handle exceptions the same way in your project. The mess starts when you mix differe...

Composition over inheritance

less than 1 minute read

I learned in 2007 in computer science class to use inheritance to achieve polymorphism-like behaviour. You just need to build a good inheritance tree to abst...

Builder pattern in Java

less than 1 minute read

Shows how to create an immutable object (Solution by Joshua Bloch from effective java)

Back to Top ↑

azure

SC-100 certification

9 minute read

SC-100: Microsoft Cybersecurity Architect https://aka.ms/courseSC-100

Managing a soft-deleted KeyVault

less than 1 minute read

When a keyvault is deleted via azure portal it is actually only soft-deleted. The reason for this is to protect the user from deleting their secrets. After a...

Back to Top ↑

ctf

Hackvent 2022

1 minute read

General infos https://www.hacking-lab.com/events/hackvent-2022

Hack the Box

1 minute read

Access Pwnbox is a VM running by HackTHeBox. Via OpenVPN (OVPN) you can connect your own computer to the hackthebox network.

Back to Top ↑

patterns

Exception versus ResultWrapper

2 minute read

null versus ResultWrapper Example DataAccessObject Every project will have some kind of data access object. At some point you need to decide a pattern how yo...

Composition over inheritance

less than 1 minute read

I learned in 2007 in computer science class to use inheritance to achieve polymorphism-like behaviour. You just need to build a good inheritance tree to abst...

Builder pattern in Java

less than 1 minute read

Shows how to create an immutable object (Solution by Joshua Bloch from effective java)

Back to Top ↑

azure-devops

Use ADO Feed inside docker

1 minute read

Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...

Introduce SonarQube

less than 1 minute read

Create a new SonarQube project In my case you would need to order this internally via devops self-service.

Back to Top ↑

ci-cd

Use ADO Feed inside docker

1 minute read

Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...

Introduce SonarQube

less than 1 minute read

Create a new SonarQube project In my case you would need to order this internally via devops self-service.

Back to Top ↑

webapp

Back to Top ↑

workshop

Back to Top ↑

docker

Use ADO Feed inside docker

1 minute read

Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...

Back to Top ↑

security

SC-100 certification

9 minute read

SC-100: Microsoft Cybersecurity Architect https://aka.ms/courseSC-100

CWE 1236 fix

less than 1 minute read

https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...

Back to Top ↑

architecture

Back to Top ↑

hacky-easter

Back to Top ↑

keyvault

Managing a soft-deleted KeyVault

less than 1 minute read

When a keyvault is deleted via azure portal it is actually only soft-deleted. The reason for this is to protect the user from deleting their secrets. After a...

Back to Top ↑

apim

Back to Top ↑

networking

Back to Top ↑

private-endpoints

Back to Top ↑

kafka

Back to Top ↑

messaging

Back to Top ↑

hackthebox

Hack the Box

1 minute read

Access Pwnbox is a VM running by HackTHeBox. Via OpenVPN (OVPN) you can connect your own computer to the hackthebox network.

Back to Top ↑

tryhackme

Back to Top ↑

advent-of-cyber

Back to Top ↑

hackvent

Hackvent 2022

1 minute read

General infos https://www.hacking-lab.com/events/hackvent-2022

Back to Top ↑

hardware

Rubber Ducky

less than 1 minute read

I bought a rubberducky from hak5 and this is what I learned:

Back to Top ↑

rubber-ducky

Rubber Ducky

less than 1 minute read

I bought a rubberducky from hak5 and this is what I learned:

Back to Top ↑

red-team

Rubber Ducky

less than 1 minute read

I bought a rubberducky from hak5 and this is what I learned:

Back to Top ↑

database

Back to Top ↑

mssql

Back to Top ↑

development

Back to Top ↑

sonarqube

Introduce SonarQube

less than 1 minute read

Create a new SonarQube project In my case you would need to order this internally via devops self-service.

Back to Top ↑

code-quality

Introduce SonarQube

less than 1 minute read

Create a new SonarQube project In my case you would need to order this internally via devops self-service.

Back to Top ↑

monitoring

Back to Top ↑

application-insights

Back to Top ↑

cwe

CWE 1236 fix

less than 1 minute read

https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...

Back to Top ↑

veracode

CWE 1236 fix

less than 1 minute read

https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...

Back to Top ↑

nuget

Use ADO Feed inside docker

1 minute read

Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...

Back to Top ↑

aks

Back to Top ↑

container-apps

Back to Top ↑

refactoring

Code smells

2 minute read

MagicNumbers/string Refactoring: Introduce constant with a meaningful name. But don’t over do it. If the constant is only used once, it might be better to le...

Back to Top ↑

craftsmanship

Code smells

2 minute read

MagicNumbers/string Refactoring: Introduce constant with a meaningful name. But don’t over do it. If the constant is only used once, it might be better to le...

Back to Top ↑

spring

Back to Top ↑

oauth2

Back to Top ↑

rest

Back to Top ↑

error-handling

Exception versus ResultWrapper

2 minute read

null versus ResultWrapper Example DataAccessObject Every project will have some kind of data access object. At some point you need to decide a pattern how yo...

Back to Top ↑

python

Data analysis with Python

less than 1 minute read

I got a table with hierarchical data and I want to have a tree structure out of it. Each row represented a business unit and its parent and the parent of the...

Back to Top ↑

data-analysis

Data analysis with Python

less than 1 minute read

I got a table with hierarchical data and I want to have a tree structure out of it. Each row represented a business unit and its parent and the parent of the...

Back to Top ↑

certification

SC-100 certification

9 minute read

SC-100: Microsoft Cybersecurity Architect https://aka.ms/courseSC-100

Back to Top ↑

sc-100

SC-100 certification

9 minute read

SC-100: Microsoft Cybersecurity Architect https://aka.ms/courseSC-100

Back to Top ↑