Explore >> Select a destination


You are here

y4y.space
| | foxglovesecurity.com
2.3 parsecs away

Travel
| | By @breenmachine What? The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I'm about to bring it to yours. No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires. In fact, even though proof of concept code was released...
| | www.stackchief.com
1.8 parsecs away

Travel
| | Java serialization in depth including what is serialization, why we need serialization in Java, how it works, the serializable interface, problems with serialization and examples.
| | inside.java
2.6 parsecs away

Travel
| | While the concept of serialization is quite simple, it often gets complicated very quickly given the various customizations that can be applied. For records we wanted to keep things as simple and straightforward as possible...
| | www.ayoy.se
29.9 parsecs away

Travel
| In almost all projects where we develop software for our customers we use some kind of open source components. It's therefore extemely importent to check the licenses of those components.