Advertising


Pages: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ]


[239]Müller, Oliver:
Auf zu den Pinguinen – Mainframe-Programme mit TXSeries auf Linux betreiben.
iX 6/2016; Seite 88 - 93
Topic:The article covers development and operating of CICS applications on Linux written in COBOL, C/C++ and PL/I. By using TXSeries is it possible to run mainframe application on the inexpensive x86 platform on Linux. On the one hand this makes a complete migration of CICS applications from the mainframe running z/OS or z/VSE to Linux on x86 systems possible. On the other hand Linux can be used as an inexpensive development platform targeting CICS on the mainframe. The article doesn't provide a theoretical view only. Showing practical examples from projects of Oliver Müller it covers what you have to take into account, what you can expect and what is possible in general with TXSeries on Linux.
[238]Müller, Oliver
Portabler Auftrieb - SSL/TLS-Netzwerkprogrammierung mit Boost.Asio, Teil 3: Client-Programmierung und Fehlerbehandlung.
heise Developer 08.04.2016
http://heise.de/-3161904
Topic:This article covers programming of client programs in C++ with the framework Boost.Asio. For encryption of network communication by TLS/SSL the OpenSSL library is used. Although Boost.Asio increases platform independence of network programs, this article shows the limits of portability by practical examples. Strategies to address this circumstance are shown in the article. Besides that the articles focuses on practical error handling for real world applications. Like the second part of this series of articles, this third article demonstrates everything by using a sample program. The sample client program is highly portable, too, and supports a broad range of system platforms such as UNIX (AIX, Solaris, HP/UX, OpenBSD, NetBSD, FreeBSD), Linux (Debian, Red Hat, SuSE) on ARM and x86/AMD64, z/Linux (IBM mainframe), Mac OS X as well as Windows (native with Visual Studio and with the UNIX/POSIX compatible environment Cygwin).
[237]Müller, Oliver:
Praktischer Auftrieb für SSL - SSL/TLS-Netzwerkprogrammierung mit Boost.Asio, Teil 2: Server-Programmierung.
heise Developer, 16.02.2016
http://heise.de/-3102667
Topic:This article demonstrates the programming of servers in C++ with Boost.Asio. For encryption of network connection by TLS/SSL OpenSSL is used. The sample program is highly portable and supports a broad range of system platforms such as UNIX (AIX, Solaris, HP/UX, OpenBSD, NetBSD, FreeBSD), Linux, z/Linux, Mac OS X as well as Windows (native with Visual Studio and Cygwin wih gcc). While covering the programming of servers the article covers IPv4 as well as IPv6 and discusses the advantages and disadvantages of Boost.Asio's Proactor design pattern in comparison with Boost.Thread and C++11 and C++14 threads respectively. The programming of network servers in C++ with Boost.Asio is covers step by step always with an eye on sample code which implements a working server.
[236]Müller, Oliver:
Auftrieb - SSL/TLS-Netzwerkprogrammierung mit Boost.Asio, Teil 1: Grundlagen.
heise Developer, 26.01.2016
http://heise.de/-3081443
Topic:This article introduces TLS/SSL network programming in C++ with Boost.Asio. This articles is the first one of a series about encrypted network programming with Boost.Asio. It introduces into the software architecture of Boost.Asio and shows the system independent and highly portable approach of this framework. The article covers ths basics of progamming synchronous and asynchronous processing of encrypted network communication. Regarding asynchronous processing, the articles covers the Proactor design pattern in detail which is essential in Boost.Asio.
[235]Müller, Oliver:
Abgesperrt - Verschlüsseln in Android-Apps.
web & mobile Developer 9.2015; Seite 98 bis 107.
Topic:The articles introduces into cryptography on the smartphone operating system Android. It also gives a general introduction into symmetric-key algorithms (block ciphers and stream ciphers) as well as asymmetric-key algorithms (public-key systems RSA and elliptic curve cryptography). After an overview of cryptography, an explanation of how crypto-algorithms work and operating modes of crypto-algorithms, the article discusses Java Cryptohgraphy Architecture (JCA) and Java Cryptography Extension (JCE) as well as the cryptographic providers available on Android. Security vulnerabilities are outlined and the integration of 3rd party providers (Spongy Castle) is explained. The practical application is presented by samples of the cryptographic systems AES, Twofish, RSA and ECDH (Elliptic Curve Cryptography Diffie-Hellman).
[234]Müller, Oliver:
Maskerade - Mainframe modernisieren mit Rumba und Rumba+.
iX 7/2015; Seite 65 bis 69.
Topic:This article shows the modernization of legacy applications on System z running z/OS and System i (AS/400) running IBM i (formerly known as OS/400) with Micro Focus Rumba+. A modern user interface can be added to old applications (green screen) without changing old source code.
[233]Müller, Oliver:
Zeitgemäß - Advanced Encryption Standard auf 8-Bit-Microcontrollern.
iX Developer 2/2014; Seite 109 bis 115.
Topic:This article introduces into the Advanced Encryption Standard (AES) and its mathematical priciples. It shows the challenges for an implementation on microcontrollers. Futhermore it describes and shows an efficient implementation in C on 8 bit microcontrollers using Atmel AVR ATmega as example.
[232]Müller, Oliver:
Sicher mobil - Cryptography Engineering, Teil 5: AES-Implementierung für mobile Endgeräte.
heise/Developer, 03.08.2012
http://heise.de/-1659321
Topic:This fifth article of a series covers the implementation of the Advanced Encrpytion Standard (AES) on smartphones and tablets running Android. It shows what challenges wait for a cryptography engineer to implement AES in a non-hardware-related programming language such as Java and how these challenges can be faced.
[231]Müller, Oliver:
Anatomy of a Stack Smashing Attack and How GCC Prevents It.
Dr. Dobb's, June 19th 2012.
http://www.drdobbs.com/security/240001832#
Topic:The article illustrates how to prevent stack overflow attacks by using the "stack smashing protector" (SSP) of GNU's gcc. After an introdution into stack overflow attacks and their threat to a computer-system's security, the article describes how SSP functions. Subsequent it illustrates SSP in practise by assembly language code generated by gcc and debugging sessios in gdb. The article uses Debian GNU/Linux 6.0.1 on x86_64 with gcc 4.4.5 as sample system.
[230]Müller, Oliver:
Preventing Stack Overflow Attacks.
Dr. Dobb's Journal, July 2012; pages 7 until 16
Topic:The article illustrates how to prevent stack overflow attacks by using the "stack smashing protector" (SSP) of GNU's gcc. After an introdution into stack overflow attacks and their threat to a computer-system's security, the article describes how SSP functions. Subsequent it illustrates SSP in practise by assembly language code generated by gcc and debugging sessios in gdb. The article uses Debian GNU/Linux 6.0.1 on x86_64 with gcc 4.4.5 as sample system.
[229]Müller, Oliver:
Herkulesaufgabe - Hardware für Mainframe-Linux mit Hercules/390 emulieren.
iX 4/2012; Seite 146 bis 151
Topic:This article introduces Linux on the IBM mainframe and explains shortly its installation onto a LPAR and under z/VM. A learning by doing course is provided by using mainframe emulator Hercules/390 on Linux. Besides the installation of z/Linux the article also provides information about managing hardware on the mainframe linux and works out the differences between a "normal" Linux and the Mainframe Linux.
[228]Müller, Oliver:
Verschlüsselter Winzling - Cryptography Engineering, Teil 4: AES auf AVR ATmega.
Heise Developer, 28.02.2012.
http://heise.de/-1442338
Topic:The article continues the implementation of the Advanced Encryption Standard (AES) on 8 bit microcontrollers which was startet at the third article of this series. It covers the implementation of AES in C on the Atmel ATmega and provides a little sample which implements a traffic light control system. The AVR which controls the traffic lights is controlled by encrypted commands received by serial interface from a PC. The article also introduces the simulation of the whole microcontroller system environment including peripherals by using AVR Studio 4, HAPSIM and com0com. Furthermore it gives hints for a real hardware implementation and provides a simple example.
[227]Müller, Oliver:
Klein, aber fein - Cryptography Engineering, Teil 3: AES auf 8-Bit-Mikrocontrollern.
Heise Developer, 20.02.2012.
http://heise.de/-1436872
Topic:This article introduces the implementation of the Advanced Encryption Standard (AES) on 8 bit microcontrollers. It uses as sample the AVR ATmega family of Atmel. The article covers the challenge of efficient calculation of multiplicative inverses in GF(256) to make it possbile to calculate s-box entries at runtime efficiently but resource defensive. Furthermore it covers the challenge of key expansion and its impact on resource and clock cycle demand.
[226]Müller, Oliver:
Überlaufschutz - Overflows mit Stack Smashing Protection erkennen.
iX 2/2012; Seite 110 bis 113.
Topic:The article introduces in detecting stack overflows by security features of modern compilers such as Stack Smashing Protection (SSP) of GNU gcc, ProPolicy of IBM XLC and Buffer Security Check (option /GS) of Microsoft Visual Studio. gcc 4.x's SSP on Linux x86_64 is used to show how the principle of stack smashing detection works. It is shown by practical debugging sessions with gdb how gcc protects against attacks which utilizing stack overflows.
[225]Müller, Oliver:
Leistungsstark mit 32 Bit - Cryptography Engineering, Teil 2: AES auf PCs und Servern.
Heise Developer, 09.11.2011.
http://heise.de/-1375774
Topic:This article covers the implementation of the Advanced Encryption Standard (AES) in C++ on PCs and server systems with at least 32 bit processor. It shows how to create a portable implementation which considers the individual features of a CPU such as 32 bit arithmatic logic unit or little and big endian. The sample code includes CppUnit tests with the "AES Known Answer Test (KAT)". It runs on a broad palette of systems starting at several Unix derivates, e.g. AIX, Solaris, HP/UX and *BSD, and Linux over Windows and in the high-end area on OpenVMS and z/OS.
[224]Müller, Oliver:
Dolly Digital - OpenVMS AXP auf Linux emulieren.
iX 11/2011; Seite 152 bis 155.
Topic:The articles is about the Alpha emulator CHARON-AXP for Linux which allows to virtualize OpenVMS AXP systems under Linux. Besides a review of the emulator the article covers the migration of physical DEC Alpha system under OpenVMS into an virtualized environment under Linux via DECnet and VMScluster.
[223]Müller, Oliver:
Code-Rebell - Turnaround-Zeiten minimieren mit JRebel.
iX 11/2011; Seite 80 bis 82.
Topic:The article shows how JRebel can help to reduce the turnaround times in development environments such as Eclipse and Netbeans as well as in build environments like Maven. JRebel allows to replace and reload of classes in a Java EE application server at runtime without any redeployment.
[222]Müller, Oliver:
Mathematik-Dompteur - Cryptography Engineering, Teil 1: Zur Theorie des Advanced Encryption Standard.
Heise Developer, 29.09.2011.
http://heise.de/-1350362
Topic:This article introduces into mathematical background of the Advanced Encryption Standard (AES) and its implementation as computer algorithm. This article is part of a series about cryptography engineering.
[221]Müller, Oliver:
Adieu Dino - Mainframe-Rehosting mit Micro Focus' Enterprise Server.
iX 3/2011; Seite 92 bis 97.
Topic:Rehosting of mainframe application under z/OS and z/VSE on Unix, Linux or Windows by using Micro Focus Enterprise Server promises a high potential of savings in the fields of license fees, maintenance costs and operating effort. This article offers a view on reachable savings and the technical barriers which have to be overcome. (Includes also application reports from practise.)
[220]Müller, Oliver:
Mehrspuring - OpenSSL: Implementierung innerhalb eines Client- und Server-Programms, Teil 4.
Heise Developer, 27.12.2010.
http://heise.de/-1157918
Topic:The article covers the implementation of the SSL server from part one until three as multi-threaded program. It shows the change from fork() to POSIX Threads. The sample is runnable under several Unix derivates, Linux, Windows (Cygwin), z/OS and OpenVMS.


Pages: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ]

 


Advertising