Exploiting information leaks in SQL injection

In some cases a SQL injection doesn't result in a trivial exploit. Instead of a direct hack, there could be an information leak vulnerability. Here's an example of a vulnerable application and an efficient attack on the information leak. Read more »

Haskell Intero in Emacs: first impressions and HOWTO

Intero is a new/enhanced Stack-integrated REPL for Haskell like GHCi. It includes an Emacs mode that integrates with Stack as well. Read more »

Haskell Programming from First Principles: Part 2

A continuation of my iterative review of the early access edition of Haskell Programming from First Principles. I cover my experiences of the last month working through chapters 5 through 10. Read more »

Haskell Programming from First Principles: Part 1

Two weeks in, I take a look at why yet another beginner Haskell book matters, how it differs from what is already out there, and why that increases your chances of success as a learner. Read more »

Alain's Cloud Design Principles

A collection of¬†my¬†opinions on design for effective Cloud computing. Ranging from DNS and NTP to service-level communications, but yet concise enough to remember (hopefully). Read more »

More results...