Loading...

Blog

A Journey of a Thousand Miles Begins with a Single Step

Permission Calculator

http://permissions-calculator.org/ is a nice web application, to calculate octal permissions for chmod.

Read more

Create datasource for H2 in JBoss

This post demonstrates how to create a datasource for the H2 database in JBoss. This recipe can easily applied to any other database like Oracle DB, MySQL and PostgreSQL.

Read more

Europe/Busingen? Check TimeZone on Linux host

We in Switzerland have the TimeZone Europe/Zurich. If you are using Java to connect to an Oracle DB, and the DB responds with an exception ORA-01882: timezone region not found it is most likely, that the connection problem is located on the linux host, in that the Java application runs. In my case it was rhel.

Read more

Countermeasure Dictionary Attacks

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or pass-phrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

Read more

Test depths within Java EE

TDD and BDD is a crucial discipline to write good and robust applications. Testing within the Java EE may cover several test depths. This post is only a short overview of possible involved products.

Read more

Counter-Strings: Self-Describing Test Data

One of the methods from Rapid Software Testing with James Bach, is to use self describing test data like counter strings. The string for the count 10 will give you exactly the character position. This is useful for boundary testing and and testing large input strings. Counter strings are helpful testing sizes of UI text and database fields.

Read more