Archive for the 'binary' Category

CRIME (security exploit) – Wikipedia, the free encyclopedia

Sunday, July 14th, 2013

from http://tech.slashdot.org/story/13/07/09/1455200/ It works like this. You visit a site that has malicious JavaScript which sends a HTTPS request to some site (like your bank). This request will include whatever known plain-text that the JavaScript …

CRIME (security exploit) – Wikipedia, the free encyclopedia

Sunday, July 14th, 2013

from http://tech.slashdot.org/story/13/07/09/1455200/ It works like this. You visit a site that has malicious JavaScript which sends a HTTPS request to some site (like your bank). This request will include whatever known plain-text that the JavaScript …

CRIME (security exploit) – Wikipedia, the free encyclopedia

Sunday, July 14th, 2013

from http://tech.slashdot.org/story/13/07/09/1455200/ It works like this. You visit a site that has malicious JavaScript which sends a HTTPS request to some site (like your bank). This request will include whatever known plain-text that the JavaScript …

Computist Quiz [questions for programmers, from CS, US Santa Barbara]]

Sunday, October 23rd, 2011

The Subj. Try to solve the questions in your head, w/out using paper and pencil. [from AVVA http://avva.livejournal.com/ ]

Computist Quiz [questions for programmers, from CS, US Santa Barbara]]

Sunday, October 23rd, 2011

The Subj. Try to solve the questions in your head, w/out using paper and pencil. [from AVVA http://avva.livejournal.com/ ]

BLOB, iBatis & PostgreSql 8.1 – dBforums [large objects vs bytea]

Sunday, August 17th, 2008

sane notes about storing binary data in Postgres. Basically bytea is ASCII representaion of bynary data wich requires decoding / escaping (read: slow) and large objects a kind of ok, but not trigger-based replication compartable