CoderOasis
  • Home
  • About
  • Discord
JDK 19: New Targeted Features
Programming

JDK 19: New Targeted Features

Java Development Kit (JDK) v19 is due this September. It has a second feature officially proposed to target it. This includes a vector API to express vector computations, which would undergo a fourth incubation in the next Java release. The other proposed feature is a port of the Java Development

  • Traven West
Traven West Apr 24, 2022 • 3 min read
Hacktivism: Social Justice by Data Leaks and Defacements
Cybersecurity

Hacktivism: Social Justice by Data Leaks and Defacements

Around the end of February, a hacktivist that calls himself JaXpArO and My Little Anonymous Revival Project breached the far-right social media platform named Gab. They managed to gain seventy gigabytes of data from the backend databases. The data contained user profiles, private posts, chat messages, and more – a lot

  • Traven West
Traven West Apr 20, 2022 • 7 min read
Apple and Meta Gave Hackers User Data by Forging Requests
Information Security

Apple and Meta Gave Hackers User Data by Forging Requests

The hackers– who may have links to cybercrime group Lapsus$ – are said to have compromised accounts to make emergency data requests on people's accounts that are using Apple and Facebook services. Apple and Facebook parent company Meta provided user data to cybercriminals last year who requested the information by pretending

  • Traven West
Traven West Apr 11, 2022 • 3 min read
Part III: RSA in Python - Preventing Side Channel Attacks

Part III: RSA in Python - Preventing Side Channel Attacks

In case you haven't read former 2 articles on this topic, below are the links: Part I: Implementing RSA in Python from ScratchI’m sure many programmers, particularly web developers have heard of the RSA cryptography system. RSA is an asymmetric cryptography system, meaning that one key is used for

FranX1024 Apr 8, 2022 • 4 min read
Authentication is still a Nightmare in 2022
Cybersecurity

Authentication is still a Nightmare in 2022

Authentication remains one of the most painstaking challenges faced by cybersecurity professionals and researchers. This ranges from a small startup all th way to the biggest organizations. This longstanding and even fundamental element of security continues to cause everyone to have a headache. For the security leaders seeking to identify

  • Traven West
Traven West Apr 3, 2022 • 5 min read
Ronin Hack Goes Almost Unknown for a Week

Ronin Hack Goes Almost Unknown for a Week

A major hack has resulted in approximately just a little over 600 million worth of cryptocurrency being stolen from Ronin. This was  the gaming-focused blockchain network used for the NFT-based game Axie Infinity. Ronin said that roughtly 173,000 Ethereum and 25 million USDC – a stable coin linked to the

  • Traven West
Traven West Apr 1, 2022 • 2 min read
Attacks of UPS Devices are on the Rise warns CISA
Cybersecurity

Attacks of UPS Devices are on the Rise warns CISA

Hackers have  now begun to attack internet-connected universal power supply devices. They are targeting their control interfaces via multiple remote code execution vulnerabilities. In some of the cases, they changed the default usernames and passwords, according to an important advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA)

  • Traven West
Traven West Mar 31, 2022 • 2 min read
Dept. of Justice Charges Three FSB Officers for Cyberattacks
Cybersecurity

Dept. of Justice Charges Three FSB Officers for Cyberattacks

It's finally time that the US Department of Justice (DoJ) has charged three Russian FSB officers and a programmer that worked for a Russian military research institute. The past attacks were against industrial control systems (ICS) operated by critical infrastructure providers. Each of the attacks involve the 2017 Triton malware

  • Traven West
Traven West Mar 26, 2022 • 4 min read
Application Layer Attacks can defeat DDoS Protection

Application Layer Attacks can defeat DDoS Protection

Security Researchers have recent observed large application-layered distributed denial-of-service attacks using techniques that could end up foiling DDoS protection and defenses in the past few years. This could be yet another sign of things and change for web application operators. This attack targeted a Chinese Lottery website that uses DDoS

  • Traven West
Traven West Mar 25, 2022 • 3 min read
Deno gets Dramatically Faster Performance for Rust Calls
Deno

Deno gets Dramatically Faster Performance for Rust Calls

Deno is now offering us faster calls into Rust are highlighted in the latest version of the Deno secure JavaScript/TypeScript runtime – drastically improving performance for everyone who uses the runtime. The Rust enhancement pertains to communication between the Google V8 JavaScript engine leveraged by Deno and the rest of

  • Traven West
Traven West Mar 24, 2022 • 1 min read
SEC Filings Show the True Cost of Ransomware Attacks
Cybersecurity

SEC Filings Show the True Cost of Ransomware Attacks

The amount of Ransomware attacks had reached unprecedented levels in 2021, with ransomware threat actors demanding, and in many cases receiving, ransom payments in the multiple sums of millions of dollars. The world’s largest meat processor, JBS, they confirmed in June 2021 that it paid the equivalent of 11

  • Traven West
Traven West Mar 23, 2022 • 4 min read
Java 18 is Officially Released
Java

Java 18 is Officially Released

Java Development Kit (JDK) 18 is now available as an official production release. The new version of standard Java has nine new features, including a simple web server and another preview of pattern matching for switch. The OpenJDK page lists the following features as officially targeting JDK 18: a service

  • Traven West
Traven West Mar 22, 2022 • 5 min read
Intuitive method of finding the inverse of a matrix
Python

Intuitive method of finding the inverse of a matrix

Finding a matrix inverse is very useful not only in Computer science but when solving equations by hand. However, using the formula Adj(A) / det(A) can be quite tedious, especially if you don't know how exactly it works. In this article I will show how to intuitively and efficiently

FranX1024 Feb 11, 2022 • 3 min read
Lower Latency for Java Garbage Collection Proposal
Java

Lower Latency for Java Garbage Collection Proposal

Garbage collection in Java – the way which we reallocation of memory through deletion of unused objects – would be improved through a proposal being considered by the developers of standard Java. A JDK Enhancement Proposal (JEP) that is floating ariynd in the OpenJDK Java community calls for highly reducing latency by

  • Traven West
Traven West Feb 4, 2022 • 2 min read
How to make a Bitcoin Transaction in Go Lang
Bitcoin

How to make a Bitcoin Transaction in Go Lang

Bitcoin is all the rage in recent years. So does Golang - a programming language developed by Google. Today I am going to instruct you how to make a simple Bitcoin transaction with Golang. Hopefully, you will be able to transfer Bitcoin without using any DApps after this tutorial. The

  • Loc Nguyen
Loc Nguyen Jan 22, 2022 • 4 min read
Can We Actually Trust Google?
Technology Policy

Can We Actually Trust Google?

For a good few years, it seemed that Google lived up to its old motto. Don’t be evil. It also seems that do no wrong in terms of product superiority. Google built its reputation as an ethical company that honestly has outperformed competitors. But is that reputation still deserved

  • Traven West
Traven West Jan 22, 2022 • 6 min read
Java Development Kit 18: The New Features
Programming

Java Development Kit 18: The New Features

The newest version of the Java Development Kit (JDK) 18 is officially set for release on March 22, 2022. The new version of standard Java will have nine new features, with the feature set having been frozen as of December 9, 2021. This release has moved into a second rampdown

  • Traven West
Traven West Jan 22, 2022 • 5 min read
Understanding Linux's True and False Commands
Linux

Understanding Linux's True and False Commands

True and False are the most common concepts in all forms of computing. They’re so highly critical to Boolean logic, but did you know that true and false are also even commands on Linux? There is a simple explanation. This is that the true command generates an exit code

  • Traven West
Traven West Jan 18, 2022 • 2 min read
Big Tech wants to make Open Source Software more Secure
Cybersecurity

Big Tech wants to make Open Source Software more Secure

The major technology companies of the United States – names such as Google, Microsoft, Apple, and Facebook – came together at an important White House Summit over the weekend to discuss the ways to make the open source software space more secure in light of recent disastrous vulnerabilities. The new standards for

  • Traven West
Traven West Jan 16, 2022 • 2 min read
Understanding Generics in Go Programming Language
Programming

Understanding Generics in Go Programming Language

The majority of programming languages have the concept of generic functions — code that can easily and efficiently accept one of a range of types without needing any specialization for each one – as long as those types all implement certain types of behaviors. Generics are a massive time-saver. If we have

  • Traven West
Traven West Jan 13, 2022 • 4 min read
AngularJS has Officially Reached the End of Life.
Web Development

AngularJS has Officially Reached the End of Life.

It's a sad day to announce to developers that the AngularJS JavaScript Framework has officially reached the End of Life (EOL) status. The development team behind the TypeScript-based Angular Framework hopes that users will move forward with the successor of the AngularJS Framework. AngularJS was originally released by Google in

  • Traven West
Traven West Jan 8, 2022 • 1 min read
The PHP Community and Development Sucks
PHP

The PHP Community and Development Sucks

The issues which I have had with the PHP for the last ten years is the community, tutorials and/or guides, and the development of web applications. Yet at the same time, the core of PHP is the amazing people which I have met so far with talent – they have

  • Traven West
Traven West Jan 2, 2022 • 4 min read
Implementing UART on the AtMega328P

Implementing UART on the AtMega328P

USART on the AtMega328PNeeded DocumentationArduino Nano PCB designAtmega328P datasheetMaterials usedArduino NanoArduino Uno R3Relevant cableComputerSoftware Usedmake (for easy of compiling and building)avr-gcc (our compiler for avr ISA)binutils-avravr-libcavrdude (used to flash board)GNU ScreenThe software above is just the software that I am using. It works on MacOS and Linux.

Todd Martin Dec 15, 2021 • 8 min read
Writing the Hello World of the embedded world

Writing the Hello World of the embedded world

Embedded C: Hello WorldNeeded DocumentationArduino Nano PCB designAtmega328P datasheetMaterials usedArduino NanoArduino Uno R3Relevant cableComputerSoftware Usedmake (for easy of compiling and building)avr-gcc (our compiler for avr ISA)binutils-avravr-libcavrdude (used to flash board)The software above is just the software that I am using. It works on MacOS and Linux. However,

Todd Martin Dec 12, 2021 • 6 min read
Getting started with Embedded C

Getting started with Embedded C

​ Introduction to Embedded C with the AtMega328P Goal By the end of this tutorial, you will be able to compile a binary written for the avr instruction set targeting the AtMega328P microcontroller on an Arduino Nano or Arduino Uno R3 form factor. Needed Documentation Arduino Nano PCB design Atmega328P datasheet

Todd Martin Dec 8, 2021 • 7 min read
CoderOasis © 2022
Powered by Ghost