This structural pattern increases the functionality of a class. Looks similar to a proxy, but it gets the object injected
Continue readingCategory: Computer
Integer overflow (C++)
Unsigned integer Range: [0,255] Binary: 00000000 =++=> 00000001 =++=> … =++=> 11111111 Hex: 0x00 =++=> 0x01 =++=> … =++=> 0xFF
Continue readingLayout of std::vector (libstdc++)
Source code Analysis Layout |——————————–| | vector vec | | 1 | 2 | 3 | 4 | 5 |
Continue readingPhishing (via Email)
Phishing comes in mind if you want access to another account, but you aren’t able to bypass the login (e.g.
Continue readingMalware comparison (Selection)
Fundamentals A Virus is a program which attaches itself to other programs. A Worm is a program which tries to
Continue readingProxy vs. VPN (HTTP(S))
The Proxy and the VPN-Server are both a node in the communication between the client and the server. Both ways
Continue readingState (Design Pattern)
This behavioral pattern is used to let objects behave differently based on their current state.
Continue readingProxy (Design Pattern)
This structural pattern controls the access to a class. Looks similar to a decorator, but it instantiates the object by
Continue readingAdapter (Design Pattern)
This structural pattern translates one class interface into another. This is a class adapter, but there also exists an object
Continue readingSingleton (Design Pattern)
This creational pattern assures that just one object can get instantiated of that class.
Continue reading