<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: George X.</title>
    <description>The latest articles on DEV Community by George X. (@gexos).</description>
    <link>https://dev.to/gexos</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F65301%2F816a5b98-2640-42a1-b2e3-0a81e64f39cd.jpg</url>
      <title>DEV Community: George X.</title>
      <link>https://dev.to/gexos</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/gexos"/>
    <language>en</language>
    <item>
      <title>Programmers need to think like hackers! </title>
      <dc:creator>George X.</dc:creator>
      <pubDate>Thu, 01 Oct 2020 18:11:47 +0000</pubDate>
      <link>https://dev.to/gexos/programmers-need-to-think-like-hackers-2ag9</link>
      <guid>https://dev.to/gexos/programmers-need-to-think-like-hackers-2ag9</guid>
      <description>&lt;p&gt;Programming is a complex task that includes five steps: problem identification, solution design, coding, testing and reporting. All of these steps are necessary to analyze security standards. Nowadays, attacks on IT systems and corporate infrastructures are a daily occurrence. Experts believe that the attacks will continue to increase due to the increased use of technology. The use of new technologies, the internet, computers, etc. also brings some security issues. Programmers are required to create not only functional applications but also secure ones.&lt;/p&gt;

&lt;p&gt;Most consumers are aware of the need for secure applications. Therefore, programmers must make security a priority.&lt;/p&gt;

&lt;p&gt;Hacking attacks cause major problems for victims (theft of personal data, installation of malware, etc.). So what is the solution? Developers need to think like malicious hackers. If this is done, cyberattacks could be greatly reduced.&lt;/p&gt;

&lt;p&gt;Most organizations now recognize the importance of an effective security policy. They are also trying to find staff who are well-trained in cybersecurity. To be more productive, developers need to start behaving and thinking like hackers. But their goal must be security (ethical hacking).&lt;/p&gt;

&lt;p&gt;Why should developers get into the logic of hackers? What characteristics should they adopt?&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Great durability&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Hackers are extremely persistent. They try hard to achieve what they want. Also, most are self-taught. They are very determined and do what they can to overcome any obstacle in front of them. Cybercriminals do not need "formal" education, degrees and theoretical knowledge. Most of the time they are self-taught and do not rely on the advice of others.&lt;/p&gt;

&lt;p&gt;Programmers need to adopt these characteristics of perseverance, determination and knowledge that they have acquired on their own to create secure programs. Many times, because they are trained and qualified professionals, they do not consider simple solutions. This is bad. Also, many programmers rely on other team members and do not take initiatives. Therefore, they do not experiment and do not evolve.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Learning from experience&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;According to research, the most effective way to learn something is to do it in practice (experience). People gain 5% of their knowledge from lectures, 10% from reading books and 75% from experience. Cybercriminals always learn from experience and are confident in themselves. Developers need to follow suit and be willing to experiment and make efforts. The knowledge they have acquired through their studies is not enough.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Willingness to exceed the limits&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Of course, "exceeding the limits" does not mean exceeding the ethical limits. It has to do with taking initiatives, experimenting and overcoming obstacles. The difference between hackers and programmers is that the former seek new vulnerabilities to exploit them, while programmers must identify them to fix them. Programmers should always learn and discover new ways to combat malicious situations.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Enjoy your work&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;When people treat a job as an obligation, they may not put in the maximum effort. A programmer who has to get a job done within a certain time frame is under pressure and may not be very innovative. Stress can make someone productive, but less effective. Programmers should always enjoy what they do and have fun to be as efficient as possible. &lt;/p&gt;

&lt;p&gt;Cybercriminals do their job without having deadlines and pressure in mind. Their only goal is success. They are more oriented towards their goal than a deadline. If programmers see things the same way, they are likely to perform better.&lt;/p&gt;

&lt;p&gt;Cybercriminals as role models?&lt;/p&gt;

&lt;p&gt;Cybercriminals are certainly not considered role models. However, they have some positive features that programmers could adopt to be more efficient and useful in creating secure applications.&lt;/p&gt;

</description>
      <category>programming</category>
      <category>hackers</category>
    </item>
    <item>
      <title>What did you learn in 2019?</title>
      <dc:creator>George X.</dc:creator>
      <pubDate>Tue, 10 Dec 2019 13:08:18 +0000</pubDate>
      <link>https://dev.to/gexos/what-did-you-learn-in-2019-j6</link>
      <guid>https://dev.to/gexos/what-did-you-learn-in-2019-j6</guid>
      <description>&lt;p&gt;What was the process like? How long did it take? Any special methods you used? Would you do it the same way if you did it over again?&lt;/p&gt;

</description>
      <category>discuss</category>
    </item>
    <item>
      <title>What do HTTP and HTTPS mean and why does it matter today </title>
      <dc:creator>George X.</dc:creator>
      <pubDate>Sun, 08 Dec 2019 17:29:41 +0000</pubDate>
      <link>https://dev.to/gexos/what-do-http-and-https-mean-and-why-does-it-matter-today-2i4o</link>
      <guid>https://dev.to/gexos/what-do-http-and-https-mean-and-why-does-it-matter-today-2i4o</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JiKqLfoz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/yLX0W42.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JiKqLfoz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/yLX0W42.png" alt=""&gt;&lt;/a&gt;&lt;br&gt;
You probably don't pay much attention to the full address of a website, after all, we are used to typing a name directly into the address bar and leaving the rest in our browser. But that wasn't always the case, once (not so old), we had to write the full URL in the address bar to get to the site we wanted.&lt;/p&gt;

&lt;p&gt;So it makes sense that today most people don't know the difference between "http" and "https". Let alone the fact that many browsers no longer show the full address (for beauty reasons). But believe me, the difference between these two features can mean the difference between stealing or not stealing your personal information and credit card in an online transaction. &lt;/p&gt;

&lt;p&gt;So if you ask your browser to show you the full address in the url bar (this is done in its settings), you will find that some sites have the 'http' prefix, while others - especially if you are doing a transaction, you will see the 'https' prefix. What is the - extremely important difference - between the two?&lt;/p&gt;

&lt;p&gt;These prefixes are related to technology protocols that make it possible to navigate through various websites, hyperlinks and web pages on the Internet. Without these technology protocols, the Web would be very different. The truth is, it would probably not exist without them.&lt;/p&gt;

&lt;p&gt;So HTTP means Hyper Text Transfer Protocol, and is the primary technology that enables hyperlinks and browsing in general - in short, without this, there is no Web navigation.  This technology is used to communicate between Web servers and clients.&lt;/p&gt;

&lt;p&gt;HTTPS is essentially the same as HTTP - as its name implies - with the addition of Secure - meaning it also has an SSL (Secure Sockets Layer). This protocol emerged from the need to secure transactions through the Web. SSL is a powerful secure and impenetrable encryption system that makes our data inaccessible to intruders when transmitted over the Internet. This system is mainly used on online shopping sites in the process of purchasing products, but also where encryption of user data is required. So we know that a site is safe if we look at the beginning of its address in the URL bar, 'https' must be there.&lt;/p&gt;

&lt;p&gt;So whenever you go shopping in an online store, and you need to enter in addition to your personal data and credit card details, it is advisable to check first whether the "https" prefix is at the address bar.&lt;/p&gt;

&lt;p&gt;One more thing: never leave a secure website without logging out - especially if you are on a public computer (office, Internet Cafe etc.). Some sites will automatically log you out but others will not. If for some reason you don't automatically log out and you forget to log out, then anyone can access your account, even with remote access.&lt;/p&gt;

&lt;p&gt;These are some basic things about http and https, here are some more resources to read from: &lt;br&gt;
&lt;a href="https://www.globalsign.com/en/blog/the-difference-between-http-and-https/"&gt;What’s the Difference between HTTP and HTTPS?&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.guru99.com/difference-http-vs-https.html"&gt; HTTP vs HTTPS: What’s the Difference? &lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.izooto.com/blog/understanding-http-https-protocols"&gt;Easy Understanding of Web Protocols - HTTP and HTTPS&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>web</category>
      <category>http</category>
    </item>
    <item>
      <title>What personal blogs would you recommend?</title>
      <dc:creator>George X.</dc:creator>
      <pubDate>Fri, 06 Dec 2019 17:41:30 +0000</pubDate>
      <link>https://dev.to/gexos/what-personal-blogs-would-you-recommend-17l1</link>
      <guid>https://dev.to/gexos/what-personal-blogs-would-you-recommend-17l1</guid>
      <description>&lt;p&gt;I'm looking for more reading from personal blogs, these are the current ones I read:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.oaktreecapital.com/insights/howard-marks-memos"&gt;https://www.oaktreecapital.com/insights/howard-marks-memos&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.docbastard.net"&gt;http://www.docbastard.net&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://meltingasphalt.com"&gt;https://meltingasphalt.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://paulgraham.com/"&gt;http://paulgraham.com/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>discuss</category>
    </item>
    <item>
      <title>What are online cookies and how do they work</title>
      <dc:creator>George X.</dc:creator>
      <pubDate>Thu, 05 Dec 2019 18:49:20 +0000</pubDate>
      <link>https://dev.to/gexos/what-are-online-cookies-and-how-do-they-work-2gj1</link>
      <guid>https://dev.to/gexos/what-are-online-cookies-and-how-do-they-work-2gj1</guid>
      <description>&lt;p&gt;This post was first seen over at &lt;a href="//www.gexos.org"&gt;gexos.org&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Why they exist, what capabilities they offer and what problems they create.
&lt;/h3&gt;

&lt;p&gt;Cookies are text files, and they provide many useful features on the Web, but there are two things that cause a reaction around cookies: The first is something that has plagued consumers for decades. Let's say you bought something from a traditional mail-order list. The company has your name, address and phone number from your order and also knows what things or services you have purchased. It may sell your information to others who may want to sell similar products or services to you. This is the fuel that makes telemarketing and junk mail (spam) possible. A website can track not only your purchases but also the pages you've read, the ads you click on, etc. If you then purchase something online and enter your name and address, then the site knows a lot more about you than a traditional mail-order company. This makes targeting a lot more accurate, and it makes many people feel uncomfortable.&lt;/p&gt;

&lt;p&gt;Different sites have different policies regarding cookies and the protection of personal data.&lt;/p&gt;

&lt;p&gt;Every site that respects its consumers and users have a strict privacy policy and does not sell or share their personal information with any third party, except where consumers themselves choose to do so (for example in a opt-in - opt-out e-mail program). With the consumer-user opt-in of the site, aggregated data is created and distributed accordingly.&lt;/p&gt;

&lt;p&gt;There are some providers that can actually create cookies that are visible on various websites. DoubleClick is the most famous example of this. Many companies use DoubleClick to serve banner ads on their websites. DoubleClick can place a small (1x1 pixels) GIF file on the web page that allows it to load cookies on your computer. DoubleClick can then track your movements across multiple websites. It can probably see the search links you type in search engines.&lt;/p&gt;

&lt;p&gt;Because it can gather so much information about you from multiple websites, DoubleClick can have very rich features. These are still anonymous, but they are rich. DoubleClick then went a step further. With the acquisition of a company, DoubleClick threatened to link these rich anonymous profiles to the name and address of each consumer-user - and threatened to tailor them to their needs and preferences, and then sell these consumer-user data. This started to look a lot like espionage for most people, and that's what caused the general outcry.&lt;/p&gt;

&lt;h3&gt;
  
  
  Problems with cookies
&lt;/h3&gt;

&lt;p&gt;Cookies are not a perfect mechanism, but they certainly do a lot of things that might otherwise be impossible. But here are some of the things that make cookies imperfect.&lt;/p&gt;

&lt;p&gt;People often share machines (PCs) - Every machine is used in a public place, and there are many machines used in an office or home environment, shared by many people. Let's say you use a public computer (in a library, for example) to buy something from an online store. The store will leave a cookie on the machine, and someone might later try to buy something from the store using your account. Large stores usually have warnings about this problem due to these frauds.&lt;/p&gt;

&lt;p&gt;Cookies can be deleted - If you have a problem with your browser and call technical support, perhaps the first thing technical support will ask you to do is delete all temporary internet files on your computer. When you do this, you will lose all cookies. Now, when you visit a site again, the site will think you are a new user and it will set a new cookie. This tends to distort the visitor's record of each site and can also be difficult for you as a user to retrieve your previously saved preferences. This is why sites may ask you to sign up in some cases - if you sign up with a username and password, you can still log in even if you lose your cookie file, so you can restore your preferences. If the preference values are stored directly on the machine, then recovery is impossible. This is why many websites now store all user information in a central database and store only one ID (password) value in the user's machine.&lt;/p&gt;

&lt;p&gt;Multiple computers - People often use more than one computer during the day. For example, you have an office machine, a home machine, and a laptop for the road. Unless the site is specifically designed to solve the problem, you will have three unique cookie files on all three machines. Each site you visit from all three machines will track and perceive you as three separate users. It can be annoying because you have to set your preferences three times. &lt;/p&gt;

&lt;p&gt;There are probably not any easy solutions to these problems, except asking users to register and storing everything in a central database.&lt;/p&gt;

</description>
      <category>web</category>
      <category>privacy</category>
      <category>security</category>
    </item>
    <item>
      <title>Error when trying to post an article</title>
      <dc:creator>George X.</dc:creator>
      <pubDate>Thu, 05 Dec 2019 17:49:52 +0000</pubDate>
      <link>https://dev.to/gexos/error-when-trying-to-post-an-article-294o</link>
      <guid>https://dev.to/gexos/error-when-trying-to-post-an-article-294o</guid>
      <description>&lt;p&gt;Hello community I'm trying to post a new article on the site but I'm getting this error:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;base:  (&amp;lt;unknown&amp;gt;): could not find expected ':' while scanning a simple key at line 5 column 1&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;I'm on firefox latest build if that matters.&lt;br&gt;
Thanks in advance!&lt;/p&gt;

</description>
      <category>help</category>
    </item>
    <item>
      <title>How To Stay Motivated When Learning to Code? </title>
      <dc:creator>George X.</dc:creator>
      <pubDate>Wed, 17 Oct 2018 16:31:00 +0000</pubDate>
      <link>https://dev.to/gexos/how-to-stay-motivated-when-learning-to-code--478h</link>
      <guid>https://dev.to/gexos/how-to-stay-motivated-when-learning-to-code--478h</guid>
      <description></description>
      <category>discuss</category>
      <category>help</category>
      <category>programming</category>
    </item>
  </channel>
</rss>
