Dirty Bomb – an unexpected love story

One year ago Dirty Bomb launched on Steam and I did not expect to play it for such a long time. Most online multiplayer shooter are not able to keep their player base over a longer period of time. But to my surprise Dirty Bomb did. After twelve months it has more concurrent players than Battleborn merely weeks after its launch. And a game that has been around for such a long time and that has been giving me countless of hours of fun deserves a detailed review. Continue reading

How to check for the gem replacement vulnerability

Recent news about the gem replacement vulnerability made want to check all installed gems on my systems. The news states that gems that have not been updated since 8 February 2015 could possible be maninpulated. Keep in mind that this is a theoretical attack vector. As far as I understand no attack making use of this approach has occured.

As there is no onboard way to check which currently used gems have not been updated since Feb 8th, 2015 you need a small script for checking. I found one called check_gems.rb from David Cuadrado. It checks all gems installed on the system. Continue reading

The sad truth behind disruptive innovation

Everything in our modern western society is software based. What seemed impossible only 20 years ago is now part of our everyday life. Software has taken over taxi services, classifieds, news consumption, movie and tv consumption, book delivery, cars, energy destribution, warfare and many more.

A new term has emerged for software-based innovation that transformed our western life style signifcantly: disruptive innovation. It means that established businesses were hit hard or were completely destroyed by a new software driven solution. Common examples are Uber, Craigslist or Netflix. Continue reading

The misconception that software has become simpler

Software getting simpler is just an illusion. The opposite is true: Software has gotten even more complicated over the past 20 years. Software nowadays consists of layers over layers of other software. Some of those layers are located in other geographical locations; and in those locations even more layers of software exist. The main reason why most people think software has become simpler is because they only see the final layer on top of all other layers. It is the shiny layer created by skilled artists and polished by countless tests and interviews with target audiences. What people see when they start an app on their phone or tablet is just a tiny fraction of what this software actually consists of. Continue reading

Use SD card as download path for Synology DS Audio Android app

Ever since Android 4.4 changed the security policies for storage no Android app can make use of SD card storage outside its app owned folder. There is a simple workaround that works like charm for the DS audio app: We move parts of the DS audio app onto the SD card. With this done an app owned folder was created on the SD card that can then be used (or misused) as download directory. Continue reading

Create a RSA key pair on Linux

The default save location of the key pair (public and private key) will be shown. It should always be ~/.ssh (/home/yourusername/.ssh).

After you confirmed the location the key pair is stored you are asked to enter a passphrase. That is your password for every system your public key of the pair is stored.

At the time of writing the default length of the key is 2048 bit.

Source: How To Set Up SSH Keys