J2ME Convertor Application

Posted by & filed under , .

Yet another resurrected (old) J2ME application from my old website. I couldn’t actually find the original page for this, just the zip file with all the sources for this and the compiled version.So you might have to figure this one by yourself I’m afraid! If (and that is a big “if” at the moment unfortunately!) […]

J2ME StopWatch Application

Posted by & filed under , .

This is another resurrect from my old website — again, it seems people are visiting my site looking for this (old) J2ME application. Please be aware that I haven’t updated this application in ages — it was known to run last time I checked, but that was a while back. I suspect as such it’s […]

Checking the Disk Quota #2

Posted by & filed under , .

This is similar to the previous disk quota exploit I mentioned, except that this time an attacker can exploit the inode quota on the disk. This quota defines how many files user can use/store on a disk/partition. If there is no capping on this value, a user process can occupy all the inodes available on […]

network pc monitors

Checking the Disk Quota #1

Posted by & filed under , .

This is again similar to the others above, except that this time an attacker can exploit the disk quota. This quota defines how much space a user can use/store on a disk/partition. If there is no capping on this value, a user process can try to fill up the disk space available in the system, […]

Checking the Memory Quota

Posted by & filed under , .

This is somehow similar to the one above, except that this time an attacker can exploit the memory quota. This quota defines how much memory a user process can allocate at a time. If there is no capping on this value, a user process can try to allocate all the memory available in the system […]

Linux Hacks — Process Quota

Posted by & filed under , .

One way an attacker might try to crash your machine is to exploit the process quota — more specifically to exploit the fact that a process quota is not set. The process quota defines an upper limit for the number of processes a user can run at any moment in time. If this is not, […]

Implications of Using XPath on Speed

Posted by & filed under , .

This is something that I have discovered recently looking through some (old) code — and it occurred to me that XPath is so powerful and easy to use that quite often programmers might forget the price paid for something this powerful. Don’t get me wrong, I’m not saying XPath is worthless (on the contrary!), if […]