Where have the women of tech history gone

Where have the woman of tech history gone First talk of this year’s FOSDEM (not counting the opening talk). Talk by Laura Durieux (see the link at the References at the bottom of the page for more details). The talk started with the question why women were underrepresented in the syllabus. This lead to the question why there is a focus on men, and who decides what makes it to the syllabus.
Read more →

Zettelkasten notes

Zettelkasten notes Somewhere during my Ph.D. I started to use the Zettelkasten style of note taking. For my research this was quite useful. Now in my programmer life after the Ph.D. it is less usefull as I can clearly see that it geared towards academics. What is a Zettelkasten? I’ve written a note on what a Zettelkasten is here. Public notes I’ve setup a link between my Zettelkasten repository and this website.
Read more →

QJsonObject to QString

Created: 2023-06-22 11:50 #cpp #qt #json With the following snippets you can convert a QJsonObject into a QString. First convert the QJsonObject to a QJsonDocument. Then output the document as a QByteArray (the toJson method) and feed that to the QString init. QJsonDocument doc(QJsonObject json); QString jsonString(doc.toJson()); References
Read more →

Proactive Threat Detection: A DNS based approach

The second publication for the TIDE project. It has received the Best Paper Award at NOMS 2018. Snowshoe spam is a type of spam which is notoriously hard to detect. Differently from regular spam, snowshoe spammers distribute the volume among many hosts, in order to make detection harder. To be successful, however spammers need to appear as legitimate as possible, for example, by adopting email best practice like Sender Policy Framework (SPF).
Read more →

ANYway: Measuring the Amplification DDoS Potential of Domains (preprint)

DDoS attacks threaten Internet security and stability, with attacks reaching the Tbps range. A popular approach involves DNS-based reflection and amplification, a type of attack in which a domain name, known to return a large answer, is queried using spoofed requests. Do the chosen names offer the largest amplification, however, or have we yet to see the full amplification potential? And while operational countermeasures are proposed, chiefly limiting responses to ‘ANY’ queries, up to what point will these countermeasures be effective?
Read more →