Collecting broadcast UDP packets using async networking in Rust
Creating a simple console application in Rust for fun and profit, including some nice tricks to push async programming to the limits. Read along →
return true;
Creating a simple console application in Rust for fun and profit, including some nice tricks to push async programming to the limits. Read along →
Thanks to Kim Carter I had the honor to appear in one of SE-Radio’s regular podcasts, where we talk about the current issues and upcoming trends of cloud security and creating secure, encrypted applications. Read along →
The #pragma once directive offers some advantages over the traditional header guard idiom, but as it is not part of the C/C++ standard we have to rely on the – not too verbose – compiler documentations. In this post, I examine what happens if you mix this directive with other Read along →
In my last article I presented an overview of the LED cube, separating the design into three parts: the cube itself and the driver and controller circuits. This time I’m going to discuss the second one and emphasize the differences between the original building instructions and my solution.
I have promised LEDs, and lots of interesting topic, but all you got is just some physics stuff, you could say. And you were right, so this time I introduce the design of my LED cube, explaining the decisions that lead to this specific design, which may help others if they are doing a similar project. Read along →
Before dealing with complex electronic circuits, we need to get familiar with some basic concepts like voltage, current, resistance and their relation. In this article I provide a realy quick summary of these terms. Read along →
It all started a few weeks ago when I decided to build my own LED cube. The decision was easy, but the realization won’t be that trivial. After some research I had to find out that there is more that I must learn than that I already know. Read along →
Microsoft’s full disk encryption software can leverage the functionality of the computers built-in TPM chip. Bacause of this you won’t have to type in yet another password every time you start the computer while the data on your hard disk still remains protected. But it is not so simple when you only want to encrypt your secondary partition. Read along →
Whether you are a Windows programmer or not, you probably have heard about Windows API. The opinions on the API and Hungarian notation are controversial, but one thing is certain: Hungarian notation gave rise to some very interesting type names. Read along →
Modern object-oriented programming languages won’t allow you to access protected members of base classes when they are used as parameters in the derived class. At first you may find this strange, but I’ll try to explain the reasoning behind this behaviour. Read along →