Article
       Thumbnail
Article

Unleashing Power of WebSockets on RHEL 6

Bohuslav Kabrda

WebSockets are a rising technology that solves one of the great needs of web development - full duplex communication between a browser (or a different client) and a server. Let's imagine a simple scenario - live web chat. In the past, you'd probably use AJAX and polling to make new posts appear in realtime. The downside is that implementing all that is not entirely easy and it tends to put a lot of strain on the server. This article will...

            Article
       Thumbnail
Article

Secure Development Series: Authorization

Langdon White

Authorization and Authentication are both important aspects to secure development. Come check out our latest video in the secure development series and learn about often overlooked authorization events in your applications. The video also discusses Cross-Site Request Forgeries (CSRF), what they are and how to avoid them (e.g. OWASP CSRF Prevention Cheat Sheet).

            Article
       Thumbnail
Article

Goodbye PowerPoint. Hello reveal.js

Linqing Lu Linqing Lu

Let's face it, sometimes slides are painful There are some common issues when I gave presentations: Will my slides file be recognized by the shared computer at the venue? How to share slides with all audiences using different OS? Most important one, how to make my slides smooth and attractive? For the first two questions, PDF might be an acceptable answer. I can upload it to slideshare.net and give out a link to audiences. But everyone knows that's not good...

            Article
       Thumbnail
Article

Secure Development Series: Numeric Errors

Langdon White

The next secure development video is out! Come check out a quick video on the impact of numeric errors during your development process. The video covers such problems as Integer Overflows, and Array Index Errors (like Bounds Checking and Index Checking). You can also find more information about overflows and security in general at The Open Web Application Security Project (OWASP). Please leave us your feedback or suggestions for other secure development topics you would like to see covered.

            Article
       Thumbnail
Article

Starting with SystemTap

William Cohen

As I stare at this blank screen to start writing my first blog entry I have that same feeling that so many developers have when starting with an unfamiliar programming language or application. The developers in our group realize that it is not easy starting from nothing and we strive to make it easier to productively use SystemTap to investigate performance problems. A starting point for anyone's first use of SystemTap is the SystemTap Beginners Guide on the Red Hat...

            Article
       Thumbnail
Article

New Secure Development Video Series

Langdon White

Software Developers always know they are supposed to be paying attention to security when they program. However, developers also know that without regular reminders both of the things they know and new threats, secure development practices can suffer. As a result, you might find the new series of videos from the Red Hat Product Security Team useful. The first two videos cover that age old topic, “Input Validation” with the first video a bit of an intro and covering XSS...

            Article
       Thumbnail
Article

Getting Started with RPMs

Langdon White

Unfortunately, not every application is packaged for every distribution. What do you do when you can't find it packaged for Red Hat Enterprise Linux? If you are like most people, you give up or attempt to install it from source. What happens when installing from source goes badly? If you are like most people, you definitely give up. How do you keep up with application improvements or, perhaps more importantly, security fixes? If you are like most people, you periodically...

            Article
       Thumbnail
Article

Setting up Django and Python 2.7 on Red Hat Enterprise 6 the easy way

Langdon White

Recently, I needed to get Django installed with Python 2.7 on Red Hat Enterprise Linux 6. As this is not a directly supported activity, I wanted to document how I went about it. As you might imagine, the generally expected method for install would be to grab the Python 2.7 source tree and then build it. Obviously, that can be a lot of work; is not particularly repeatable; and, potentially, exposes you to more security flaws. As a result, I...

            Article
       Thumbnail
Article

Array allocation in C++

Florian Weimer

This technical article covers a subtlety in C++ array allocation and how we changed the GNU C++ compiler to deal with it properly. When a programmer writes T *p = new T[3];the C++ compiler allocates room for at least three copies of objects of type T on the heap. These objects require 3 * sizeof(T) bytes. For this example, assume sizeof(T) is 12, then it is straightforward to allocate 36 bytes (for example, using malloc). But what happens if the...

            Article
       Thumbnail
Article

7 ways to improve your application's performance with the new Developer Toolset 1.1 release

Matt Newsome

Are you missing out on opportunities to increase your applications' performance? As an application developer building on Red Hat Enterprise Linux, you invest a lot of time and effort into making your applications compelling and useful for your users. You probably also want to see good performance. But beyond good design, careful algorithm selection and compiler optimizations, what can a developer use to boost their application performance? 1. The latest GCC release and associated tools The very first thing a...