Posts Tagged: C

Goodies in Groovy from DefaultGroovyMethods

Posted by & filed under , .

If you ever programmed in Groovy language, you probably “enjoyed” (maybe without realising) the joys of DefaultGroovyMethods. What you probably don’t realise is that you can override these methods to customize your classes — and occasionally generate some code that’s not that easy to read. (Do you remember the old C++ way of overriding operators […]

AppLovin + Aerospike

Of Advertising and Scaling Up

Posted by & filed under , , .

I have attended the other week a very interesting meetup – part of the “Scale Warriors of Silicon Valley” series (which by the way I highly recommend if you’re into that sort of “thing” – and chances are if you’re a developer in the Valley you are! 😉 ) – and as with everything I […]

System Console Support — JDK 1.6

Posted by & filed under , , , .

I’m sure some of you have found the need occasionally to use the “console” input/output support provided by the JDK via System.in and System.out — if nothing else just to implement an occasional more complicated command-line “scripty” app to be run in a Linux environment and piped input in or out from/to another program. The […]

Checking the Disk Quota #2

Posted by & filed under , .

This is similar to the previous disk quota exploit I mentioned, except that this time an attacker can exploit the inode quota on the disk. This quota defines how many files user can use/store on a disk/partition. If there is no capping on this value, a user process can occupy all the inodes available on […]

network pc monitors

Checking the Disk Quota #1

Posted by & filed under , .

This is again similar to the others above, except that this time an attacker can exploit the disk quota. This quota defines how much space a user can use/store on a disk/partition. If there is no capping on this value, a user process can try to fill up the disk space available in the system, […]

Checking the Memory Quota

Posted by & filed under , .

This is somehow similar to the one above, except that this time an attacker can exploit the memory quota. This quota defines how much memory a user process can allocate at a time. If there is no capping on this value, a user process can try to allocate all the memory available in the system […]

Linux Hacks — Process Quota

Posted by & filed under , .

One way an attacker might try to crash your machine is to exploit the process quota — more specifically to exploit the fact that a process quota is not set. The process quota defines an upper limit for the number of processes a user can run at any moment in time. If this is not, […]

network pc monitors

Developing for multi-cores and the cloud

Posted by & filed under , .

I have noticed recently that “cloud” and “multi-core” became buzz words in the Java world. (About time if you ask me!) The interesting bit is the implication it has on writing code — and so many developers (and not only!) are blogging their nuts off about this. All of a sudden it is ok to […]