Blog

PEER TO PEER – HOLE PUNCHING

Allgemein

This article should only give you a little introduction to the hole punching process and not a complete composition of all technical details. First I want to show you why peer to peer (P2P) networks are very important for many Internet applications.One of the most important P2P applications is Skype, originally named “Sky peer-to-peer”, but […]

Read more >

THE IMPORTANCE OF HASHING PASSWORDS, PART 1: CRYPTOGRAPHIC HASHES

Allgemein

Many applications store passwords for user authentication. Using an appropriate password hashing algorithm can efficiently protect the stored passwords even when the persisted password hashes get stolen by an attacker. Unfortunately many developers assigned with the task to implement a persistent password storage lack the necessary cryptographical background knowledge to choose a strong password hashing […]

Read more >

APACHE WICKET – WEBSOCKET SUPPORT

Allgemein

With Apache Wicket there exists a component based Web Framework which supports the new WebSocket protocol.I want to give you a short introduction to Apache Wicket with the focus on the new WebSocket Support. It will be explained by developing a little real-time chat application in 7 steps. As I mentioned in my previous article WebSocket […]

Read more >

THE COMMAND AND QUERY RESPONSIBILITY SEGREGATION (CQRS) DESIGN PATTERN

Allgemein

Introduction The ‘Command and Query Responsibility Segregation’ (CQRS) design pattern is based on the “Command-Query Separation” (CQS) principle from the book “Object-Oriented Software Construction“ by Bertrand Meyer (1988) and was first mentioned by Greg Young and Udi Dahan in 2010. This pattern has produced a lot of excitement and hype but the principle behind it […]

Read more >