2024

Code smells

2 minute read

MagicNumbers/string Refactoring: Introduce constant with a meaningful name. But don’t over do it. If the constant is only used once, it might be better to le...

Back to Top ↑

2023

Use ADO Feed inside docker

1 minute read

Normal case When you use ADO Nuget feed from a pipeline you do something like this: Create feed on ADO or use existing Add the feed into your Nuget.Conf...

CWE 1236 fix

less than 1 minute read

https://cwe.mitre.org/data/definitions/1236.html http://georgemauer.net/2017/10/07/csv-injection.html https://www.veracode.com/blog/secure-development/data-e...

Introduce SonarQube

less than 1 minute read

Create a new SonarQube project In my case you would need to order this internally via devops self-service.

Rubber Ducky

less than 1 minute read

I bought a rubberducky from hak5 and this is what I learned:

Back to Top ↑

2022

Hackvent 2022

1 minute read

General infos https://www.hacking-lab.com/events/hackvent-2022

Hack the Box

1 minute read

Access Pwnbox is a VM running by HackTHeBox. Via OpenVPN (OVPN) you can connect your own computer to the hackthebox network.

Managing a soft-deleted apim resource

less than 1 minute read

When a keyvault is deleted via azure portal it is actually only soft-deleted. The reason for this is to protect the user from deleting their secrets. After a...

Exceptions

1 minute read

Exceptions In Java, you can to a lot with exceptions. You should use and handle exceptions the same way in your project. The mess starts when you mix differe...

Composition over inheritance

less than 1 minute read

I learned in 2007 in computer science class to use inheritance to achieve polymorphism-like behaviour. You just need to build a good inheritance tree to abst...

Builder pattern in Java

less than 1 minute read

Shows how to create an immutable object (Solution by Joshua Bloch from effective java)

Back to Top ↑