<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Alex P</title>
    <description>The latest articles on DEV Community by Alex P (@devh0us3).</description>
    <link>https://dev.to/devh0us3</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1438833%2F5cc60a83-9950-406b-a6ac-dd6b81091faa.png</url>
      <title>DEV Community: Alex P</title>
      <link>https://dev.to/devh0us3</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/devh0us3"/>
    <language>en</language>
    <item>
      <title>How a Metric Mix-Up Burned $327 Million</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Sat, 04 Apr 2026 14:03:25 +0000</pubDate>
      <link>https://dev.to/devh0us3/how-a-metric-mix-up-burned-327-million-3c5i</link>
      <guid>https://dev.to/devh0us3/how-a-metric-mix-up-burned-327-million-3c5i</guid>
      <description>&lt;p&gt;A spacecraft traveled 670 million kilometers, but died at the very end because of a misunderstanding between two lines of code&lt;/p&gt;

&lt;p&gt;In September 1999, an ambitious NASA mission to Mars ended in a disaster that went down in history as a huge management failure. The most expensive “lost in translation” mistake in history turned a science probe into a spectacular but useless meteor&lt;/p&gt;

&lt;p&gt;The main problem with the Mars Climate Orbiter (MCO) was a communication gap between two teams of developers. The contractor, Lockheed Martin, built the thruster control software (SM_FORCES) using the imperial system (pound-force seconds). However, the navigation team at NASA JPL expected the data to be in the metric system (newton-seconds), as stated in the Software Interface Specification (and in the science!)&lt;/p&gt;

&lt;p&gt;Because of this, sending raw numbers without converting them led to completely unmet expectations in the code. The navigation software assumed the data was in the correct metric format, but the values were fundamentally unequal and desperately needed to be converted&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8oyt10ulswwtd69huuvc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8oyt10ulswwtd69huuvc.png" alt=" " width="578" height="110"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It is ironic and dangerous that the United States is one of the few countries in the world (along with Liberia and Myanmar) that has not officially adopted the metric system. While the global science community has used the metric system for decades, using pounds and inches in an interplanetary mission showed a severe lack of system awareness&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7oc9wtevueow3eq2jzid.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7oc9wtevueow3eq2jzid.png" alt=" " width="800" height="919"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Just a small reminder from a school:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9mx6xsubkoqp40m1c45t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9mx6xsubkoqp40m1c45t.png" alt=" " width="338" height="120"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Physics made the situation even worse. The spacecraft’s asymmetric solar array created a twisting force from solar wind pressure. To stay stable, the system had to fire its thrusters much more often than originally planned. Every time it did this, it sent bad data to the navigation computer, where the force was 4.45 times weaker than it should have been (the ratio of a pound to a newton). This error, which might have gone unnoticed, built up to critical levels because the maneuvers happened so often&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Python pseudo-code showing the fatal out-of-sync issue 
# between Lockheed Martin (ground software) and NASA JPL (navigation)
&lt;/span&gt;
&lt;span class="c1"&gt;# ---------------------------------------------------------
# Contractor module (Lockheed Martin) - Uses imperial system
# ---------------------------------------------------------
&lt;/span&gt;&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;calculate_small_forces&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;thrust_time_sec&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
    &lt;span class="c1"&gt;# Developer uses pound-force (lbf)
&lt;/span&gt;    &lt;span class="n"&gt;thrust_lbf&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;get_raw_thruster_force&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; 

    &lt;span class="c1"&gt;# data without conversion for data_from_amd_file
&lt;/span&gt;    &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="n"&gt;thrust_lbf&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="n"&gt;thrust_time_sec&lt;/span&gt; 

&lt;span class="c1"&gt;# ---------------------------------------------------------
# Navigation module (NASA JPL) - Expects metric system (SI)
# ---------------------------------------------------------
&lt;/span&gt;&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;update_spacecraft_trajectory&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;data_from_amd_file&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
    &lt;span class="c1"&gt;# JPL is sure it gets data exactly in newton-seconds (N-s)
&lt;/span&gt;    &lt;span class="n"&gt;impulse_newton_seconds&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;data_from_amd_file&lt;/span&gt; 

    &lt;span class="c1"&gt;# 1 lbf = 4.45 N, so navigation thinks the thrust is 4.45 times weaker
&lt;/span&gt;    &lt;span class="n"&gt;current_trajectory&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;altitude&lt;/span&gt; &lt;span class="o"&gt;-=&lt;/span&gt; &lt;span class="nf"&gt;apply_orbital_mechanics&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;impulse_newton_seconds&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

    &lt;span class="sh"&gt;"""&lt;/span&gt;&lt;span class="s"&gt;
    RESULT: Ground computers heavily underestimated the braking force
    In reality, the spacecraft was flying lower and lower towards the planet
    &lt;/span&gt;&lt;span class="sh"&gt;"""&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Catastrophic Consequences
&lt;/h3&gt;

&lt;p&gt;On September 23, 1999, the spacecraft began its manoeuvre to enter orbit&lt;/p&gt;

&lt;p&gt;The navigators expected it to pass at an altitude of 226 km, with the absolute minimum survival height being 80 km&lt;/p&gt;

&lt;p&gt;But because of the built-up error, the probe hit the atmosphere at just 57 km&lt;/p&gt;

&lt;p&gt;The spacecraft was instantly destroyed by aerodynamic stress and burned up&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Damage in numbers and facts:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;$327.6 million&lt;/strong&gt; - the total cost of the MCO program (including $193.1M to build it, $91.7M to launch it, and $42.8M for operations)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Science failure:&lt;/strong&gt; The MCO probe was supposed to act as the main data relay for the next spacecraft, the Mars Polar Lander (MPL). Sadly, just a couple of months later, the MPL also crashed during landing due to a different software bug (the engines shut off too early). This made 1999 one of the worst years in the history of Mars exploration&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Lessons for the IT Industry
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Strict typing for physical values and clear naming&lt;/strong&gt;
Never use raw types (double, float) for measurements. Use Value Objects (like NewtonSecond or PoundSecond classes) so the compiler stops you from mixing units. For example, some programmers in financial banks create their own Money types or separate UserId and CompanyId types so they don’t accidentally add different currencies or confuse a user with a company. If strict types are impossible, arguments and methods must clearly state the unit in their name: for example, calculateThrustInNewtons instead of calculateThrust&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Integration testing is not just a bunch of Unit tests&lt;/strong&gt;
Each team tested their own code perfectly, but nobody checked how the data flowed together in a real end-to-end scenario (E2E). E2E tests and long simulations with real data exchange files are the only ways to catch hidden errors that build up over time and don’t show up in short, isolated tests&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Investigate all anomalies deeply&lt;/strong&gt;
Any time a system acts differently than expected, it must be studied immediately. JPL navigators actually noticed strange things a week before the crash: the spacecraft needed path corrections too often, and its approach speed didn’t perfectly match the model. These “quiet alarms” were ignored. Remember: if reality differs from your monitoring by even a fraction of a percent, it is a reason to pull the emergency brake, not just hope for the best&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Space requires perfect interfaces. The story of the MCO is a painful reminder that even the most complex and advanced system will fall apart if its parts speak different languages&lt;/p&gt;

</description>
      <category>errors</category>
    </item>
    <item>
      <title>HE WANTED TO MEASURE THE INTERNET, BUT ENDED UP BREAKING IT AND MAKING HISTORY</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Sun, 29 Mar 2026 11:58:47 +0000</pubDate>
      <link>https://dev.to/devh0us3/he-wanted-to-measure-the-internet-but-ended-up-breaking-it-and-making-history-3hh1</link>
      <guid>https://dev.to/devh0us3/he-wanted-to-measure-the-internet-but-ended-up-breaking-it-and-making-history-3hh1</guid>
      <description>&lt;p&gt;&lt;em&gt;HE WROTE A SCRIPT OUT OF PURE CURIOSITY. BUT HE ENDED UP CRASHING 10% OF THE WORLD'S INTERNET, CAUSING MILLIONS OF DOLLARS IN DAMAGE, AND BECOMING THE FIRST PERSON EVER CONVICTED OF COMPUTER FRAUD&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Robert Tappan Morris, a student at Cornell University, didn’t want to be an evil hacker. He just wanted to see how big the internet was. However, because of one tiny mistake in his code, his harmless experiment turned into an unstoppable digital disaster&lt;/p&gt;

&lt;h2&gt;
  
  
  THE STORY OF THE “GREAT WORM”
&lt;/h2&gt;

&lt;p&gt;It was 1988. The internet (then called ARPANET) was a small, closed club for universities, research centers, and the military. It was built on trust - nobody expected an attack from their own colleagues&lt;/p&gt;

&lt;p&gt;On November 2, 1988, 23-year-old Robert Morris launched a program to count all the computers connected to the internet. The program (later called the “Morris Worm”) spread by using known weaknesses in network tools like sendmail and fingerd, as well as weak passwords&lt;/p&gt;

&lt;p&gt;The idea was smart: the worm enters a server, checks if it is already infected, and if not, it copies itself and looks for new targets. It didn’t delete files or steal data. It was supposed to be completely harmless&lt;/p&gt;

&lt;p&gt;But Morris thought of a problem: what if smart system admins set up a fake signal that says “I’m already infected” to protect their servers? To get around this, Morris added a rule: 1 out of every 7 times, the worm should ignore the server’s answer and infect it anyway&lt;/p&gt;

&lt;p&gt;This was the fatal mistake!&lt;/p&gt;

&lt;p&gt;A 1-in-7 chance (about 14%) was way too high. The worm started infecting the same computers over and over again. Each new copy created more processes, eating up all the memory and CPU power. Thousands of servers simply froze and crashed. Out of the 60,000 computers on the internet at the time, about 6,000 went down&lt;/p&gt;

&lt;p&gt;In a panic, Morris tried to send an anonymous message explaining how to stop the worm. But the internet was so clogged that the message never arrived. Finally, following the advice of his father (who happened to be a top cybersecurity expert at the NSA), Robert turned himself in. The damage was estimated to be between $100,000 and $10,000,000. Morris got a light sentence: 3 years of probation, 400 hours of community service, and a $10,050 fine&lt;/p&gt;

&lt;h2&gt;
  
  
  LESSONS LEARNED BY THE TECH INDUSTRY
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Trust is a bad security plan.&lt;/strong&gt; The Morris Worm proved that the internet was no longer a safe place. Systems had to be built assuming the network is hostile&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The birth of CERT.&lt;/strong&gt; Right after the attack, the government funded the first Computer Emergency Response Team (CERT) to coordinate responses to future cyber attacks&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The danger of exponential growth.&lt;/strong&gt; Even harmless code can become a weapon if a bug causes an endless loop or uncontrolled copying&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security by default.&lt;/strong&gt; The worm used a flaw in sendmail because the program was shipped with a “debug” mode left on. This taught developers a hard lesson about turning off testing features before releasing software&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Today, Robert Morris is a respected professor at MIT and a co-founder of the famous startup accelerator, Y Combinator&lt;/p&gt;

&lt;h2&gt;
  
  
  THE SOURCE CODE AND THE FAMOUS BUG
&lt;/h2&gt;

&lt;p&gt;The original code was reverse-engineered back in 1988. Today, you can find its source code in historical archives on GitHub&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0eugpa6e7swe0dw304zs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0eugpa6e7swe0dw304zs.png" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg6u7d4xn21a7ocgoz2q0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg6u7d4xn21a7ocgoz2q0.png" alt=" " width="450" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  PSEUDOCODE OF THE FATAL ERROR
&lt;/h2&gt;

&lt;p&gt;The whole disaster happened because the creator was too paranoid and misunderstood probability. In simple terms, the worm’s logic looked like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;random&lt;/span&gt;

&lt;span class="c1"&gt;# This logic runs INSIDE the new worm process AFTER it has successfully
# infected, compiled, and started itself on the target server
&lt;/span&gt;
&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;logic_inside_new_worm_process&lt;/span&gt;&lt;span class="p"&gt;():&lt;/span&gt;
    &lt;span class="c1"&gt;# STEP 1: The infection has ALREADY happened
&lt;/span&gt;    &lt;span class="c1"&gt;# The server has already spent CPU/RAM to receive and launch this process
&lt;/span&gt;
    &lt;span class="c1"&gt;# The worm checks if another copy is already running on this machine
&lt;/span&gt;    &lt;span class="c1"&gt;# (usually by trying to connect to a specific local socket/port)
&lt;/span&gt;    &lt;span class="n"&gt;already_infected&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;check_for_other_copies_locally&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;already_infected&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="c1"&gt;# THE FATAL BUG:
&lt;/span&gt;        &lt;span class="c1"&gt;# Morris was paranoid that system administrators would "fake" an
&lt;/span&gt;        &lt;span class="c1"&gt;# infection by running a dummy process to trick the worm into leaving
&lt;/span&gt;
        &lt;span class="c1"&gt;# To bypass this, he added a 1-in-7 chance to IGNORE the result:
&lt;/span&gt;        &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;random&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;randint&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;7&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="c1"&gt;# "I don't believe this is a real worm!"
&lt;/span&gt;            &lt;span class="c1"&gt;# The worm ignores the existing process and stays alive anyway
&lt;/span&gt;            &lt;span class="nf"&gt;stay_alive_and_continue_spreading&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
        &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="c1"&gt;# Even if the 1-in-7 chance didn't hit, the worm didn't quit yet
&lt;/span&gt;            &lt;span class="c1"&gt;# It would "talk" to the other process and flip a coin (50/50 chance)
&lt;/span&gt;            &lt;span class="c1"&gt;# to decide which one of them should terminate
&lt;/span&gt;            &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;random&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;choice&lt;/span&gt;&lt;span class="p"&gt;([&lt;/span&gt;&lt;span class="bp"&gt;True&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="bp"&gt;False&lt;/span&gt;&lt;span class="p"&gt;]):&lt;/span&gt;
                &lt;span class="nf"&gt;terminate_self&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
            &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
                &lt;span class="nf"&gt;stay_alive_and_continue_spreading&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
    &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="c1"&gt;# No other copy found; the machine is "fresh"
&lt;/span&gt;        &lt;span class="nf"&gt;stay_alive_and_continue_spreading&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;THE RESULT:&lt;/strong&gt;&lt;br&gt;
Because the worm was constantly re-attacking the same servers, the 1-in-7 "stay alive" chance was hit repeatedly. Machines ended up with dozens of copies running simultaneously, eventually crashing the system (Denial of Service)&lt;/p&gt;

&lt;h2&gt;
  
  
  TIMELINE OF EVENTS
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;November 2, 1988:&lt;/strong&gt; Deploys the worm from MIT. The ARPANET infection begins&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;November 3, 1988:&lt;/strong&gt; Crashes around 6,000 computers, causing massive slowdowns. Experts at UC Berkeley and Purdue rush to reverse-engineer the code&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;November 1988:&lt;/strong&gt; DARPA responds to the crisis by funding the first CERT&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;July 26, 1989:&lt;/strong&gt; A federal grand jury indicts Morris&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;January 1990:&lt;/strong&gt; Morris is found guilty&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>errors</category>
      <category>security</category>
    </item>
    <item>
      <title>Youtube Overflow</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Sun, 15 Feb 2026 08:45:44 +0000</pubDate>
      <link>https://dev.to/devh0us3/youtube-overflow-2bne</link>
      <guid>https://dev.to/devh0us3/youtube-overflow-2bne</guid>
      <description>&lt;p&gt;I have written about a case when some outdated software components were used for more modern conditions, and it led to the Ariane 5 crash. But this time I wrote about a simpler case&lt;/p&gt;

&lt;p&gt;So, at the end of 2014, the video Gangnam Style reached the most views ever in the whole of YouTube history. &lt;br&gt;
And suddenly the counter of views stopped on the number &lt;code&gt;2 147 483 647&lt;/code&gt; (2^31)&lt;br&gt;
The counter is literally broken&lt;/p&gt;

&lt;p&gt;Initially, YouTube was developed via the Python language, which handles large numbers very well.&lt;br&gt;
But the database MySQL isn't!&lt;br&gt;
And if a number is defined like a &lt;code&gt;signed int&lt;/code&gt; the value &lt;code&gt;2 147 483 647&lt;/code&gt; is the maximum&lt;/p&gt;

&lt;p&gt;Of course, YouTube's developers implemented a fix quickly, and now the max value for counters takes 64 bits. This number is so big, so it takes more than 4 billion years for mankind to reach the limit... I would like to live so long 🖖&lt;/p&gt;

&lt;p&gt;A little demo of how it doesn't work for MySQL &lt;a href="https://www.db-fiddle.com/f/uuVvjyPmCqyD3Mk38SCQhF/1" rel="noopener noreferrer"&gt;https://www.db-fiddle.com/f/uuVvjyPmCqyD3Mk38SCQhF/1&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff7bcv2gdhblabf7s2inp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff7bcv2gdhblabf7s2inp.png" alt=" " width="800" height="337"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And what happens on the Python &lt;a href="https://python-fiddle.com/?checkpoint=1771142861" rel="noopener noreferrer"&gt;https://python-fiddle.com/?checkpoint=1771142861&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzz8ctwxmpkpy6e5wmpml.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzz8ctwxmpkpy6e5wmpml.png" alt=" " width="800" height="664"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It was so cool that Youtube's developers added the Easter egg on the video page that broke their counter&lt;br&gt;
Unfortunately they have removed it, but some good persons kept the video for history&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/G1tsY46C_zc?start=1"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

</description>
      <category>errors</category>
      <category>overflow</category>
    </item>
    <item>
      <title>WAF Checker — Guess what? Someone is actually using it!</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Sat, 14 Feb 2026 21:00:57 +0000</pubDate>
      <link>https://dev.to/devh0us3/waf-checker-guess-what-someone-is-actually-using-it-4fcm</link>
      <guid>https://dev.to/devh0us3/waf-checker-guess-what-someone-is-actually-using-it-4fcm</guid>
      <description>&lt;p&gt;It was a big surprise to see that people are actually using this project! Because of that, I decided to make it much better and more user-friendly&lt;/p&gt;

&lt;p&gt;The most noticeable improvement is the &lt;strong&gt;complete redesign&lt;/strong&gt;. The tool now looks more professional, includes a dark mode, and is much easier to navigate, just check it here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F95sayng81m07sxgyzz3x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F95sayng81m07sxgyzz3x.png" alt=" " width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here is a summary of what else has changed in &lt;strong&gt;WAF Checker&lt;/strong&gt; recently:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Batch Testing&lt;/strong&gt;: You can now test up to &lt;strong&gt;100 URLs at once&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;HTTP Protocol Manipulation&lt;/strong&gt;: Added advanced tests for &lt;strong&gt;HTTP Verb Tampering&lt;/strong&gt;, &lt;strong&gt;Parameter Pollution&lt;/strong&gt;, and special headers (like &lt;code&gt;X-HTTP-Method-Override&lt;/code&gt;) to find hidden bypasses&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Smart URL Handling&lt;/strong&gt;: The &lt;code&gt;{PAYLOAD}&lt;/code&gt; placeholder can now be placed anywhere in the URL&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;New WAF Bypass Techniques&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;  Added "support" for &lt;strong&gt;Base64 encoding&lt;/strong&gt; (successfully bypasses NoSQL injection blocks)&lt;/li&gt;
&lt;li&gt;  Updated the payload list with &lt;strong&gt;sensitive files&lt;/strong&gt; and common system paths&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Documentation Update&lt;/strong&gt;: The README is now a complete guide covering all 19 attack categories and WAF detection tips for Cloudflare, AWS, and Akamai&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;The project is completely free. You can follow its development or suggest new ideas here: &lt;strong&gt;&lt;a href="https://github.com/SecH0us3/waf-checker" rel="noopener noreferrer"&gt;https://github.com/SecH0us3/waf-checker&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Feel free to suggest more features in the Issues section&lt;/p&gt;

&lt;p&gt;Ah, the link to project &lt;a href="https://dub.sh/waf-redisign" rel="noopener noreferrer"&gt;https://waf.secmy.app/&lt;/a&gt; (no sms/registration/ads etc...)&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>security</category>
      <category>waf</category>
      <category>ai</category>
    </item>
    <item>
      <title>My new post about software error and spaceship disaster https://yoursec.substack.com/p/ariane-5-launch-disaster-because</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Tue, 27 Jan 2026 19:24:11 +0000</pubDate>
      <link>https://dev.to/devh0us3/my-new-post-about-software-error-and-spaceship-disaster-53if</link>
      <guid>https://dev.to/devh0us3/my-new-post-about-software-error-and-spaceship-disaster-53if</guid>
      <description>&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://yoursec.substack.com/p/ariane-5-launch-disaster-because" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fsubstackcdn.com%2Fimage%2Ffetch%2F%24s_%21OrwD%21%2Cw_1200%2Ch_675%2Cc_fill%2Cf_jpg%2Cq_auto%3Agood%2Cfl_progressive%3Asteep%2Cg_auto%2Fhttps%253A%252F%252Fsubstack-post-media.s3.amazonaws.com%252Fpublic%252Fimages%252Fdf56dc07-011a-427e-a38b-1254e046394c_1378x890.png" height="450" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://yoursec.substack.com/p/ariane-5-launch-disaster-because" rel="noopener noreferrer" class="c-link"&gt;
            Ariane 5 launch disaster because code issues - by Alex P
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
            The catastrophic failure of the Ariane 5 (flight 5), happened on 4 June 1996, is the example how a software error based on data-types, led to the real destruction of the spaceship and huge financial loss.
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fsubstackcdn.com%2Fimage%2Ffetch%2F%24s_%212Dyy%21%2Cf_auto%2Cq_auto%3Agood%2Cfl_progressive%3Asteep%2Fhttps%253A%252F%252Fsubstack-post-media.s3.amazonaws.com%252Fpublic%252Fimages%252Ffbdf32ff-24f4-4542-8918-fc462333e14a%252Ffavicon.ico" width="64" height="64"&gt;
          yoursec.substack.com
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
    </item>
    <item>
      <title>WAF Checker: False Positive Test</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Wed, 04 Jun 2025 03:56:17 +0000</pubDate>
      <link>https://dev.to/devh0us3/waf-checker-false-positive-test-pn5</link>
      <guid>https://dev.to/devh0us3/waf-checker-false-positive-test-pn5</guid>
      <description>&lt;p&gt;This tool supports now False Positive Test - checks if your WAF incorrectly blocks legitimate traffic. This helps ensure your security doesn't interfere with normal users&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy8u0hlk56ej4uvp602vh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy8u0hlk56ej4uvp602vh.png" alt="Image description" width="800" height="601"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F277n290tyrg49cczqkl7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F277n290tyrg49cczqkl7.png" alt="Image description" width="800" height="615"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>security</category>
      <category>waf</category>
      <category>vulnerabilities</category>
    </item>
    <item>
      <title>Free WAF Checker: Major improvement</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Mon, 02 Jun 2025 17:55:40 +0000</pubDate>
      <link>https://dev.to/devh0us3/free-waf-checker-major-improvement-559o</link>
      <guid>https://dev.to/devh0us3/free-waf-checker-major-improvement-559o</guid>
      <description>&lt;p&gt;Hi there, so as a continued, I have improved WAF Checker tool, and you may check your website free, without SMS &amp;amp; registration 🖖&lt;/p&gt;

&lt;p&gt;&lt;a href="https://waf.secmy.app/" rel="noopener noreferrer"&gt;https://waf.secmy.app/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8j7vxnzaf8a0muu8pm88.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8j7vxnzaf8a0muu8pm88.png" alt="Image description" width="800" height="1444"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>waf</category>
      <category>security</category>
      <category>javascript</category>
    </item>
    <item>
      <title>WAF Checker: A Simple Web Tool for Testing Your Web Application Firewall</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Thu, 29 May 2025 18:58:13 +0000</pubDate>
      <link>https://dev.to/devh0us3/waf-checker-a-simple-web-tool-for-testing-your-web-application-firewall-528</link>
      <guid>https://dev.to/devh0us3/waf-checker-a-simple-web-tool-for-testing-your-web-application-firewall-528</guid>
      <description>&lt;p&gt;Recently, I came across a bash script that checks the effectiveness of a Web Application Firewall (WAF). While it was useful, I wanted a bit more flexibility and the ability to add my own custom checks. I also wasn’t comfortable running a random bash script from the internet on my machine – even in a container. So, I decided to create this small web app, which allows not only me, but also you, to easily test how well your WAF is working.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://waf.secmy.app/" rel="noopener noreferrer"&gt;WAF Checker&lt;/a&gt; is a simple, user-friendly service that lets you test your web application firewall against common attack payloads (like SQLi, XSS, Path Traversal, Command Injection, SSRF, NoSQLi, and LFI) using various HTTP methods. You just enter your target URL, select the HTTP methods you want to test, and get a clear, color-coded summary of the results. Just go and try &lt;a href="https://waf.secmy.app/" rel="noopener noreferrer"&gt;https://waf.secmy.app/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you’re interested in the latest techniques for bypassing WAF rules, I recommend checking out waf-bypass.com – it’s a great resource for staying up to date with new evasion methods and research.&lt;/p&gt;

&lt;p&gt;Feel free to use this tool to test your own WAF and contribute ideas or improvements!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdezq6l2xt93dd2u7lffx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdezq6l2xt93dd2u7lffx.png" alt="Image description" width="800" height="666"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>waf</category>
    </item>
    <item>
      <title>I have published new post about how to Check yourself in data breaches and what to do with this information https://yoursec.substack.com/p/check-yourself-in-data-breaches</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Sun, 04 May 2025 18:04:28 +0000</pubDate>
      <link>https://dev.to/devh0us3/i-have-published-new-post-about-how-to-check-yourself-in-data-breaches-and-what-to-do-with-this-454a</link>
      <guid>https://dev.to/devh0us3/i-have-published-new-post-about-how-to-check-yourself-in-data-breaches-and-what-to-do-with-this-454a</guid>
      <description></description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>privacy</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Star Wars Day - May 4</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Sun, 04 May 2025 13:16:12 +0000</pubDate>
      <link>https://dev.to/devh0us3/star-wars-day-may-4-5g54</link>
      <guid>https://dev.to/devh0us3/star-wars-day-may-4-5g54</guid>
      <description>&lt;p&gt;A long time ago, in a data center far, far away…&lt;/p&gt;




&lt;p&gt;Hello, today is a Star Wars Day, but my blog is about information technologies&lt;/p&gt;

&lt;p&gt;Someone says, that it’s possible to watch Star Wars story by telnet:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;telnet towel.blinkenlights.nl&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;starwars&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But looks like it does not work already, anyway - I have found that it exists as a html: just visit the website &lt;a href="https://asciimation.co.nz/" rel="noopener noreferrer"&gt;asciimation.co.nz&lt;/a&gt;:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhoch6ddltu17km7mill6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhoch6ddltu17km7mill6.png" alt="Image description" width="800" height="614"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And the Google’s performance:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5jhudcxdwog2jhz5h95b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5jhudcxdwog2jhz5h95b.png" alt="Image description" width="800" height="501"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;PS: I do not know, how to insert video here, so look at by yourself or go on my original post&lt;/p&gt;

</description>
      <category>itday</category>
      <category>telnet</category>
    </item>
    <item>
      <title>National Space Day: May 2</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Sat, 03 May 2025 07:27:24 +0000</pubDate>
      <link>https://dev.to/devh0us3/national-space-day-02-may-4f6f</link>
      <guid>https://dev.to/devh0us3/national-space-day-02-may-4f6f</guid>
      <description>&lt;p&gt;Let’s celebrate this Space Day and review your disk’s space of your laptop&lt;/p&gt;

&lt;p&gt;It’s easy todo with ncdu&lt;/p&gt;

&lt;p&gt;Just install and run:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# macos&lt;/span&gt;
brew &lt;span class="nb"&gt;install &lt;/span&gt;ncdu

&lt;span class="c"&gt;# linux ubuntu&lt;/span&gt;
apt &lt;span class="nb"&gt;install &lt;/span&gt;ncdu

&lt;span class="c"&gt;# linux fedora&lt;/span&gt;
dnf &lt;span class="nb"&gt;install &lt;/span&gt;ncdu

&lt;span class="c"&gt;# run&lt;/span&gt;
ncdu &lt;span class="nb"&gt;.&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Demo: &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8liwak205y7zelzhcljk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8liwak205y7zelzhcljk.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Video demo look at original page here &lt;a href="https://yoursec.substack.com/p/national-space-day-2025-05-02" rel="noopener noreferrer"&gt;https://yoursec.substack.com/p/national-space-day-2025-05-02&lt;/a&gt;&lt;/p&gt;

</description>
      <category>itday</category>
      <category>disk</category>
      <category>tools</category>
      <category>linux</category>
    </item>
    <item>
      <title>World Password Day</title>
      <dc:creator>Alex P</dc:creator>
      <pubDate>Thu, 01 May 2025 10:15:18 +0000</pubDate>
      <link>https://dev.to/devh0us3/world-password-day-59d4</link>
      <guid>https://dev.to/devh0us3/world-password-day-59d4</guid>
      <description>&lt;p&gt;Today is World Password Day - Celebrated Every First Thursday in May&lt;/p&gt;

&lt;p&gt;In the past, early operating systems (mainly mainframes) that used password protection stored passwords in plain text. The password files could be printed, and people would leave jokes in each other's home directories&lt;/p&gt;

&lt;p&gt;Today, systems only store password hashes, but many data breaches, weak hashing algorithms, rainbow tables, or even dictionary brute force attacks combined with insecure application design still pose a threat to data security&lt;/p&gt;

&lt;p&gt;That's why on World Password Day, it's important to remember how to use passwords correctly:&lt;/p&gt;

&lt;p&gt;1️⃣ Each website or service should have its own unique password&lt;/p&gt;

&lt;p&gt;2️⃣ Passwords should not be simple – ideally, they should be so complex that you can't remember them&lt;/p&gt;

&lt;p&gt;3️⃣ You should use a password manager to help with this&lt;/p&gt;

&lt;p&gt;4️⃣ Don't rely only on passwords – use 2FA (two-factor authentication) when possible&lt;/p&gt;

&lt;p&gt;5️⃣ Regularly change passwords for accounts where it's the only security factor and there's no protection against brute force attacks&lt;/p&gt;

&lt;p&gt;Check the quality of your "favorite password" here: &lt;a href="https://haveibeenpwned.com/Passwords" rel="noopener noreferrer"&gt;https://haveibeenpwned.com/Passwords&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Also check if your accounts have been involved in data breaches and sign up for alerts: &lt;a href="https://haveibeenpwned.com/" rel="noopener noreferrer"&gt;https://haveibeenpwned.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A password manager will help generate the strongest passwords. To find the perfect password manager for you, visit: &lt;a href="https://passwordmanager.com/" rel="noopener noreferrer"&gt;https://passwordmanager.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;By the way – password managers can also help you share important documents securely&lt;/p&gt;

&lt;p&gt;And password managers will proactively notify you about data breaches&lt;/p&gt;

&lt;p&gt;PS: Ideally, we should move away from passwords where possible in favor of more secure authentication methods, but there are areas where only passwords can be used, such as: password-protected documents, archives, Wi-Fi routers, home security cameras, or even your phone&lt;/p&gt;

&lt;p&gt;For more information: &lt;a href="https://www.techradar.com/pro/live/world-password-day-2025-all-the-news-updates-and-advice-from-our-experts" rel="noopener noreferrer"&gt;https://www.techradar.com/pro/live/world-password-day-2025-all-the-news-updates-and-advice-from-our-experts&lt;/a&gt;&lt;br&gt;
And &lt;a href="https://www.hivesystems.com/blog/are-your-passwords-in-the-green" rel="noopener noreferrer"&gt;https://www.hivesystems.com/blog/are-your-passwords-in-the-green&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs5hu8pg2zcpq5ao4x7k3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs5hu8pg2zcpq5ao4x7k3.png" alt="Image description" width="800" height="603"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feq7cdrsz68rg8on2tjuh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feq7cdrsz68rg8on2tjuh.png" alt="Image description" width="800" height="791"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>worldpasswordday</category>
      <category>password</category>
      <category>security</category>
    </item>
  </channel>
</rss>
