Patch Your Samba Servers or Risk a Worse Version of WannaCry
The big cybersecurity news of the past couple of weeks has been the WannaCry worm. It took advantage of some rather old bugs, dating back to Windows XP and Windows Server 2003. We got lucky! The vulnerability, the problems in the targets, allowed unlimited abuse. But the exploit, the attackers’ code, had a built-in “kill […]
New Features in C# 7
In this article, we’ll look at some of the new language features of C# 7 that will help us write cleaner, less buggy code in a shorter time. Binary literals In C# 6 we can currently represent integers in decimal or hexadecimal formats. int d = 42; int h = 0x2A; In C# 7, we […]
Is functional programming more effective than object-oriented programming?
Imperative vs functional programming. It’s a debate that goes back to the birth of high-level languages—Fortran vs Lisp. In later years, it was retreaded as object-oriented vs function programming (OOP vs FP)—OOP having become the (massively) dominant software development paradigm. And, I’m a fully paid-up member. I embraced Object Pascal via Delphi 1 on 1995 […]
SharePoint Security Best Practices – Article 2
Security and performance at the same time in SharePoint In my first article, I talked about how Microsoft is an object oriented environment and the objects are stored in namespaces. I discussed the fact that each object has its own list of security permission entries called Access Control Entries (ACE) that determines who can access […]
How Do You Conquer Just-In-Time Requirements?
“What is the difference between an up-front requirements document and a fish?” said Gollum, hoping to catch the Hobbit out with his riddle. But Bilbo Baggins, though a Halfling, was an experienced Agilist. He knew the answer. “A fish rots from the head down, “ he said, “but a requirements documents rots from the bottom […]