Explore threats, vulnerabilities, and risks in security topics.
I am passionate about researching Computer Science. I received my Ph.D. in Computer Science from the Informatics Department of the Federal University of Parana (UFPR – Brazil). My main research interests are computer networks, data compressing, and optimization techniques. Of course, I love a good cup of coffee!
Here's what I've written (so far):
Baeldung on Computer Science
- Security (30)
- Networking (24)
- Programming (9)
- Software Architecture (8)
- OS (8)
- Algorithms (4)
- Latex (3)
- Math and Logic (2)
- Core Concepts (2)
- Concurrency (2)
- Searching (1)
- Graphs (1)
- Data Structures (1)
Explore honeypots in security.
Explore logic bombs.
Learn about bugs and the debugging process.
Learn about unit and integration testing.
Study public, private, and hybrid clouds.
Learn about coarse-grained and fine-grained entities in computing.
Learn the differences between the Internet, intranet, and extranet.
Learn about white-box and black-box testing.
Explore four commandments of simple design in the context of XP methodology.
Study the cyber kill chain.
Learn about the underlay and overlay networks.
Study the differences between active and passive attacks.
Learn about the simulation and emulation.
Explore the concepts of high availability and fault tolerance.
Explore the FCAPS model for network management.
Explore the meaning of lexicon, syntax, and semantics in the context of computing, particularly programming languages.
Explore traffic engineering through traffic shaping and policing techniques.
Learn about the Network Function Virtualization (NFV) paradigm.
Study Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
Learn about formjacking attacks.
Explore hash codes and how they are related to checksums.
Learn about credential stuffing and password spraying attacks.
Learn about cold and warm caches.
Explore deterministic and stochastic optimization.
Learn about the differences between heuristics, metaheuristics, and probabilistic strategies.
Learn about stateless and stateful firewalls.
Explore elitism in the context of evolutionary algorithms.
Explore permission and role-based access control mechanisms.
Learn how to represent relevant programming structures into a flowchart.
Learn how private URLs and password-based authentication can provide access control in networked services.
Learn about the security aspects of the CIA (Confidentiality, Integrity, and Availability) triad.
Learn how to share symmetric keys for cryptography in a secure way.
Explore security related keys, initialization vectors, and nonces resources.
Explore the technical details and implementation architectures of demilitarized zones.
Explore the scalability and elasticity of a computing system.
Explore the XaaS offerings of IaaS, PaaS, and SaaS.
Explore the essential services of an operating system.
Learn about zip bombs, and how they’re created and employed in particular attacks.
Learn about the man-in-the-middle attacks.
Study distributed denial of service attacks (DDoS).
Explore multi-step and multi-factor authentication schemes.
Explore hash tables and their time complexity
Learn about abstract and virtual methods.
Learn about HTTP versions.
Learn about the relation between asymmetric cryptography and certificates.
Explore the antipattern called magic numbers.
Explore the main differences and similarities between centralized and distributed systems.
Explore hash collision resistance.
Learn about security by obscurity in the context of computing
Learn about 32 and 64-bit architectures.
Learn how to create presentations with LaTeX.
Learn about sequences of graphs nodes.
Learn about polynomial interpolation.
Learn how to draw flowcharts with LaTeX/TikZ.
Learn about simple and salted hashing.
Learn how to export LaTeX/TikZ defined images to image file formats.
Explore the concepts of non-opinionated and opinionated software design.
Learn about rainbow table attacks.
Learn about encoding and signing with asymmetric encryption.
Learn about active and passive TCP connections opening.
Learn about the pseudo-header in the context of modern TCP/IP.
Learn about the differences between a processing core and a CPU.
Explore the general structure of messages transmitted in computer networks.
Learn about binary and counting semaphores.
Learn about about FIN and RST messages of TCP.
Learn about the HTTP methods of PUT and PATCH.
Explore the imperative and declarative programming paradigms.
Learn about subnets in IPv4 networks.
Study different message addressing methods.
Explore the management of Random Access Memory (RAM).
In this tutorial, we’ll see an introduction to multiprocessing and multithreading.
Explore the cache memory concepts.
Learn how these handshaking protocols typically work, their benefits, and their shortcomings
Learn how socket binding works.