Web Interface to Oracle Database

, 1 min read

I had to provide access to an Oracle database but the standard port at 1521 was hindered by company firewall and company proxy rules. In previous times there was iSQL*Plus, but this product no longer seems to be available. I found Adminer as an alternative. It is written by Jakub Vrána. It is very…

Statistics of this Blog: Crossed 80.000 Views

, 1 min read

This blog was viewed more than 80.200 times since its inception and had more than 60.000 visitors. The averages per month are: Between 1,000 and 2,000 views per month in bar chart form: The most popular posts over all years are: The most popular blog posts this year were: USA is at the top of…

Blocking Network Attackers

, 19 min read

In Using Odroid as IP Router I wrote about using my Odroid as router and firewall. Additionally I inspect who tries to log-in to my machines using the lastb command. Sample output is below: $ lastb admin ssh:notty 202.166.220.10 Mon Oct 1 09:51 - 09:51 (00:00) admin ssh:notty …

Passing HashMap from Java to Java Nashorn

, 3 min read

Java Nashorn is the JavaScript engine shipped since Java 8. You can therefore use JavaScript wherever you have at least Java 8. Java 8 also has a standalone interpreter, called jjs. It is possible to create a Java HashMap and use this structure directly in JavaScript. Here is the code: import…

Statistics of this Blog: Crossed 70.000 Views

, 1 min read

This blog was viewed more than 71.400 times since its inception and had more than 54.000 visitors. The averages per month are: Between 1,000 and 2,000 views per month in bar chart form: The most popular blog posts over all years are: The most popular blog posts this year were:

Balking ARM ArchLinux Update

, 1 min read

Had an issue with update of ARM ArchLinux which I use here. Error messages like: (95/95) checking keys in keyring [####################################################] 100% (95/95) checking package integrity …

Using Scooter Software Beyond Compare

, 1 min read

Beyond Compare is a graphical file comparison tool sold by Scooter Software. Its open-source competitors are mainly vimdiff, and kdiff3. Its advantage is ease-of-use. While comparing files they can be edited instantly. You can diff complete directory trees. It is written in Delphi Object Pascal,…

Instant Messaging Client Pidgin and Skype / Lync

, 1 min read

One can use the instant messaging client Pidgin and Skype. Skype for Business was previously called Lync. Install Pidgin pacman -S pidgin and install the SIP/Simple protocol for Skype for Business/Office 365/Lync pacman -S pidgin-sipe Setting up the account: Use your company mail-address.…

Remote Unlocking of Encrypted Disks

, 3 min read

1. Problem statement. You have an encrypted disk and want to decrypt the disk during boot while not sitting in front of your computer. Solution is sketched and indicated in dm-crypt/Specialties. Below is a little bit more explanation. For the following you must be root. 2. Required software…

Set-Up "Let's Encrypt" for Hiawatha Web-Server

, 4 min read

Google announced that starting with Chrome version 68 they will gradually mark HTTP-connections as "not secure". "Let's Encrypt" is a free service for web-masters to obtain certificates in an easy manner. Work on "Let's Encrypt" started in 2014. Setting up "Let's…

Set-Up Hiawatha Web-Server

, 2 min read

I stumbled upon Hiawatha web-server when I read about a web-server for a houseboat by Ronald Scheckelhoff, WB8LZR. I had used Apache, thttpd, Lighttp, NGINX, and others before. Now I use the Hiawatha web-server. Since August 2023 I use the NGINX web-server. Hiawatha has three objectives, which are…

Towards web-based delta synchronization for cloud storage systems

, 5 min read

Very interesting article. Some remarkable excerpts: To isolate performance issues to the JavaScript VM, the authors rebuilt the client side of WebRsync using the Chrome native client support and C++. It’s much faster. Replacing MD5 with SipHash reduces computation complexity by almost 5x. As a…

Unix Command comm: Compare Two Files

, 1 min read

One lesser known Unix command is comm. This command is far less known than diff. comm needs two already sorted files FILE1 and FILE2. With the options -1 suppress column 1 (lines unique to FILE1) -2 suppress column 2 (lines unique to FILE2) -3 suppress column 3 (lines that appear in both…

Unix sort Issue

, 1 min read

I wondered why Unix sort behaved strangely. printf "A0 1\nA 1\n" | sort delivered A0 1 A 1 Of course, I expected A to come before A0. This was strange, as printf "A1 1\nA 1\n" | sort produced A 1 A1 1 just as expected. Also, printf "A0\nA\n" | sort orders A…

Parallelization and CPU Cache Overflow

, 4 min read

In the post Rewriting Perl to plain C the runtime of the serial runs were reported. As expected the C program was a lot faster than the Perl script. Now running programs in parallel showed two unexpected behaviours: (1) more parallelizations can degrade runtime, and (2) running unoptimized programs…

Rewriting Perl to plain C

, 7 min read

Perl script was running too slow. Rewriting it in C made it 20 times faster. 1. Problem statement. Analyze call-tree dependency in COBOL programs. There are 77 million lines of COBOL code in ca. 30,000 files. These 30,000 COBOL programs could potentially include 74,000 COPY-books comprising 10…

Hashing with Iterator in C

, 6 min read

Many scripting languages, like Awk, Perl, Python, Lua, and so on, have hash-tables already built-in. I needed hashing functionality similar to Perl's hash-variables. In particular I needed lookup, insert, and iterating over all entries. I wrote on hashing in Hashing Just Random Numbers and Hash…

Filippo Mantovani: ARM for HPC

, 1 min read

On 23-Oct-2017 Filippo Mantovani held a talk in Darmstadt on "Mobile technology for production-ready high-performance computing systems: The path of the Mont-Blanc project". Unfortunately I was unable to attend, but Mr. Mantovani sent me his Darmstadt Seminar slides. As his slides and…

Optimal Product Portfolio

, 2 min read

1. Prerequisites Assume one owns $n>0$ different products, $n\in\mathbb{N}$, usually $n\approx 100$. Each product has a cost $c_i>0$, $c_i\in\mathbb{R}$, associated with this ownership, $i=1,\ldots, n$. Let $N=\left\{1,\ldots,n\right\}$, and $\mathbb{P}(N)$ be the powerset of $N$, i.e., the…

Statistics of this Blog: Crossed 60.000 Views

, 1 min read

This blog was viewed more than 60.000 times since its inception and had more than 45.000 visitors. I wrote about the development of this blog as follows: 2014/05/07: 5,000 Views 2014/09/10: 10,000 Views 2014/12/27: 15,000 Views 2015/04/23: 20,000 Views 2016/01/24: 30,000 Views 2016/11/12: 40,000…



← Older       Newer →