It’s more and more common with the new generation of mobiles nowadays to have a megapixel camera built in the mobile itself. And with that comes the fact that if you ever want to allow your user to select one of the images s/he has captured with this camera (see above) you are dealing with […]
J2ME: Read an Image from the Device Filesystem
As you’ve seen with previous posts, I’m trying to make sure that all the stuff that used to be on my old website and people are still looking for is being brought back to light; and one of the search terms that I see redirecting people to my website is “j2me read file” — for […]
J2ME Convertor Application
Yet another resurrected (old) J2ME application from my old website. I couldn’t actually find the original page for this, just the zip file with all the sources for this and the compiled version.So you might have to figure this one by yourself I’m afraid! If (and that is a big “if” at the moment unfortunately!) […]
J2ME StopWatch Application
This is another resurrect from my old website — again, it seems people are visiting my site looking for this (old) J2ME application. Please be aware that I haven’t updated this application in ages — it was known to run last time I checked, but that was a while back. I suspect as such it’s […]
Optimize the Download Speed of a Web Page: CSS
Since I’m going through the old website and resurrecting pages which seem to be still sought after by visitors to my website (I can tell this based on search engines terms they use and what they search for then on my website), I’ve come across this old one, talking about optimizing the loading speed of […]
Checking the Disk Quota #2
This is similar to the previous disk quota exploit I mentioned, except that this time an attacker can exploit the inode quota on the disk. This quota defines how many files user can use/store on a disk/partition. If there is no capping on this value, a user process can occupy all the inodes available on […]
Checking the Disk Quota #1
This is again similar to the others above, except that this time an attacker can exploit the disk quota. This quota defines how much space a user can use/store on a disk/partition. If there is no capping on this value, a user process can try to fill up the disk space available in the system, […]
Checking the Memory Quota
This is somehow similar to the one above, except that this time an attacker can exploit the memory quota. This quota defines how much memory a user process can allocate at a time. If there is no capping on this value, a user process can try to allocate all the memory available in the system […]
Linux Hacks — Process Quota
One way an attacker might try to crash your machine is to exploit the process quota — more specifically to exploit the fact that a process quota is not set. The process quota defines an upper limit for the number of processes a user can run at any moment in time. If this is not, […]
Implementing Squirrel Mail Autocomplete Plugin under Mozilla Firefox
For the heavy SquirrelMail users, you are without a doubt using your address book a lot! (Unless you have a really good memory and can remember by heart any email address in your address book! Personally I can’t! 🙂 And if you do, you might have contemplated using the Autocomplete Plugin for SquirrelMail, which does […]








