Skip to content

Max's Blog

  • Home
  • About
Max's Blog
January 7, 2020 max-sperling

Phishing (via Email)

Phishing comes in mind if you want access to another account, but you aren’t able to bypass the login (e.g.

Continue reading
January 7, 2020 max-sperling

Malware comparison (Selection)

Fundamentals A Virus is a program which attaches itself to other programs. A Worm is a program which tries to

Continue reading
January 2, 2020 max-sperling

Proxy vs. VPN (HTTP(S))

The Proxy and the VPN-Server are both a node in the communication between the client and the server. Both ways

Continue reading
December 28, 2019 max-sperling

Fighting stances (Comparison)

Stance Front / Square Frontal Side Neutral Side Rear Side Pelvis position 0° 45° 90° 135° Illustration (Orthodox shown here,

Continue reading
December 26, 2019 max-sperling

The way from recreational to technical diving

Recreational Diving (Within no-deco limit and without overhead enviroment) Open Circuit Level 1: OC Single BM (Air/Nitrox) Level 2: OC

Continue reading
December 18, 2019 max-sperling

Downsizing

Hauptziel des Downsizing ist es die CO2-Emission und den Spritverbrauch zu senken und gleichzeitig die Leistung beizubehalten. Die Strategie ist

Continue reading
December 18, 2019 max-sperling

State (Design Pattern)

This behavioral pattern is used to let objects behave differently based on their current state.

Continue reading
December 18, 2019 max-sperling

Proxy (Design Pattern)

This structural pattern controls the access to a class. Looks similar to a decorator, but it instantiates the object by

Continue reading
December 18, 2019 max-sperling

Adapter (Design Pattern)

This structural pattern translates one class interface into another. This is a class adapter, but there also exists an object

Continue reading
December 18, 2019 max-sperling

Singleton (Design Pattern)

This creational pattern assures that just one object can get instantiated of that class.

Continue reading

Posts navigation

«Previous Posts 1 … 28 29 30 31 32 … 40 Next Posts»

Categories

  • Other (19)
    • Games (13)
    • Nutrition (4)
    • Traveling (2)
  • Science (17)
    • Chemistry (3)
    • Linguistics (2)
    • Math (10)
    • Physics (2)
  • Sport (73)
    • Climbing (5)
    • Diving (20)
    • Fitness (8)
    • Martial arts (34)
      • Ground fighting (9)
      • Mixed martial arts (4)
      • Stand-up fighting (12)
    • Running (1)
    • Surfing (2)
    • Swimming (1)
    • Volleyball (2)
  • Technology (288)
    • Computer (258)
      • Architecture & Design (15)
      • Artificial intelligence (3)
      • Audio & Video (11)
      • Building & Reversing (15)
        • CMake (2)
      • Computational complexity (3)
      • Computer architecture (4)
      • Debugging & Memory (29)
      • Development (72)
        • CI/CD (1)
        • Programming (61)
          • Concurrency (12)
          • Data structures (13)
          • Pointers & References (7)
        • Scripting (4)
        • Testing (6)
      • Development process (5)
      • Hacking & Security (17)
      • Hardware & Protocols (8)
      • Networking (11)
      • Operating system (21)
        • Linux (12)
        • Windows (8)
      • Regular expression (2)
      • Tool configuration (5)
      • Version control (22)
      • Virtualization (7)
      • Web (29)
    • Electrics (9)
    • Mechanics (15)
    • Medicine (2)
    • Photography (4)
WordPress Theme: Wellington by ThemeZee.