Phishing comes in mind if you want access to another account, but you aren’t able to bypass the login (e.g.
Continue readingAuthor: max-sperling
Malware comparison (Selection)
Fundamentals A Virus is a program which attaches itself to other programs. A Worm is a program which tries to
Continue readingProxy vs. VPN (HTTP(S))
The Proxy and the VPN-Server are both a node in the communication between the client and the server. Both ways
Continue readingFighting stances (Comparison)
Stance Front / Square Frontal Side Neutral Side Rear Side Pelvis position 0° 45° 90° 135° Illustration (Orthodox shown here,
Continue readingThe way from recreational to technical diving
Recreational Diving (Within no-deco limit and without overhead enviroment) Open Circuit Level 1: OC Single BM (Air/Nitrox) Level 2: OC
Continue readingDownsizing
Hauptziel des Downsizing ist es die CO2-Emission und den Spritverbrauch zu senken und gleichzeitig die Leistung beizubehalten. Die Strategie ist
Continue readingState (Design Pattern)
This behavioral pattern is used to let objects behave differently based on their current state.
Continue readingProxy (Design Pattern)
This structural pattern controls the access to a class. Looks similar to a decorator, but it instantiates the object by
Continue readingAdapter (Design Pattern)
This structural pattern translates one class interface into another. This is a class adapter, but there also exists an object
Continue readingSingleton (Design Pattern)
This creational pattern assures that just one object can get instantiated of that class.
Continue reading