Skip to content

Posts tagged ‘Recommended’


My Definitive List of Must-have Free Mac Applications and Best Paid-for Counterparts

These are the apps that I will install first on pretty much any new Mac that I get. I’m a huge fan of free and open source software, and no other platform has free software of the same quality and calibre as Mac OS X. Most of these are Mac-only apps (a couple are cross-platform). I’m listing free applications wherever possible, but if there is a paid-for app that I consider best-of-breed, I mention those too. Hopefully this list will help all of the techie switchers get the apps they need quickly. This list is a work-in-progress, so I’ll be adding to this it over time.

If you’re only interested in my recommended security apps, they’re at the bottom! Feel free to post in the comments if you have any you think are worth mentioning.

Last updated: 14/04/2015

Read moreRead more


Invading Privacy Using Information Scraps

I’ve just stumbled across this post on the Attack Vector blog where the author, Matt, gets back at a spammer by digging up a whole bunch of personal info about him and his family, and posting it online. The post itself is from May 2010, but I felt it reflected the importance of being aware of one’s privacy on the internet.

Using only the spammer’s email address and IP address, he  describes the process of gradually digging up information in WHOIS records, Google, Facebook, and other information mining sites, in order to obtain a fairly descriptive profile. I highly recommend reading it for anyone who’s interesting in online privacy or information gathering.

I also recommend using the following Venn diagram when considering the effects of the internet on your privacy:

There is no overlap. Diagram by Dave Hoffman.


Bobby Tables: A Guide to Preventing SQL Injection

Just came across whilst Stumbling through the ether that is the interwebs.

XKCD strip: bobby-tables

Source: XKCD

The aim of the site is to educate software developers (or anyone else interested in development) in the proper manner in which input should be validated prior to being passed into database queries. There are examples for ASP, ColdFusion, C#, Delphi, .NET, Java, Perl, PHP, PostgreSQL, Python, Ruby, and Schema… what, no COBOL?!

Their core recommendations are sound:

  • Do not create SQL statements that include outside data.
  • Use parameterized SQL calls.

Useful resource. Just thought I’d share.