You are here |
studiofreya.org | ||
| | | |
hanno.codes
|
|
| | | | In the summer of 2021, I got my Java 11 certification. I expected it to be quite a breeze, because I'd been a Java developer for 14 years and surely I should have seen it all by now, right? Turned out I was very wrong. I came across lots of things that I didn't even know were possible with Java. In this weekly blog series I will go through 11 of these 'crazy learnings' that surprised me the most, even as an experienced developer. Today we'll look at the crazy stuff that is allowed in switch statements. | |
| | | |
connorberry.com
|
|
| | | | Language Comparison Perl: while (<>) { print "$. : $_" } Perl: while (<>) { print "$. : $_" } CSharp: using System; using System.IO; class App { public static void Main(string[] args) { int line_number = 1; foreach (string arg in args) { foreach (string line in File.ReadLines(arg)) { Console.WriteLine(line_number + ":" + line);... | |
| | | |
badoption.eu
|
|
| | | | ZipJar, a little bit unexpected attack chain The upcoming from the .zip TLDs from Google brought some discussion about attack vectors. Most of those attack vectors are not completely new, like using an "@" to split between username and host. While playing a little bit around, an unexpected attack chain appeared, involving a .zip TLD, Windows Explorer, WebDAV and a jar file. Some further reading and research: https://www.kaspersky.com/blog/zip-mov-domain-extension-confusion/48254/ https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse https://mrd0x.com/file-archiver-in-the-browser/ | |
| | | |
paramdeo.com
|
|
| |