My thoughts on Java after having used it for 2 months

One thing that has always annoyed me during my CEGEP studies is that although my CEGEP actually offers a computer programming profile, I can't take it. It is much easier for me to study pure & applied sciences in CEGEP and then apply to software engineering or computer science at university afterwards than it is to take the computer programming route at CEGEP because then I would be stuck catching up on a bunch of the requirements like calculus and physics after CEGEP.

You might ask, "Pure & applied sciences aren't so bad... So why is it annoying?" It's annoying because I cannot take more than one computer science-related course throughout my two years of studies at CEGEP in pure and applied science. Anyways, that ranting just to say that I've been saving that one computer-related class for my last semester, so this term I've been attending Introduction to Computer Programming in Engineering.

To my disappointment, I found out that we were going to be using Java throughout the entire class in class (I was hoping for a more modern programming language like Python, which I think would have been better suited for programming beginners). I've also always hated Java. Up until now I didn't really have a solid foundation for the hate - I just didn't like anything about it.

Now that two months of the course have gone by, I can say that I still dislike Java. I'll keep my reasons quick and to the point, but keep in mind that I'm saying this from the perspective of designing user applications to be run on a desktop machine:

  • For the longest time, Java was closed-soure and remained under the sole control of Sun Microsystems (now Oracle). Although most of Java has now been open sourced, the OpenJDK implementations are still incomplete.
  • Have you ever seen a GUI Java project? Even with a good deal of theming, they tend to look terrible next to some of the C++ GUI projects using Qt or WxWidgets for example. I'm a big fan of ease of use and good user interfaces, and Java does this very poorly with very little integration with the OS running the JVM. This point alone is enough to make me never touch Java again.
  • Java has much of the complexity of C or C++... So why not just program in C or C++? Doing the bit of extra work to handle garbage collection and getting it to work on multiple platforms will just make you a more experienced and better programmer in the long run. In addition, if you decide to use a toolkit like Qt or WxWidgets then much of the multi-platform work is done for you already.
  • Java has many annoying quirks:
    • Only one public class per file allowed
    • The filename must be the same as the name of that one public class
    • For all functional purposes it doesn't matter, you cannot make a simple, global "subroutine" in Java; everything must be a method and belong to a class.
  • It's clunky. If you start to add in GUI, networking and a few other components to your program it starts to get pretty large and resource-intensive. A C++ equivalent of the same program would be more efficient.

And there you have it: why I don't like using Java for real world application programming. Java certainly has its place - I think that it takes care of the mobile market/niche wonderfully - but for desktop applications Java is the wrong tool for the job.

Rating: 

Daylight Saving Time

R.I.P. 2am... We'll miss you ;)

Rating: 
Tags: 

Securing your online identity

Within the past month or so, I find it odd that the occurrence of friends who have had their Hotmail, Gmail, Facebook or other online accounts hijacked has roughly tripled... Probably some new social engineering technique or malware is behind it, but I took the time to write this up since preventing account hijacking from happening to you is easy and probably won't take more than 5 minutes to make the changes to your online accounts.

Choose secure passwords

Part of basic online security is choosing a good password. Remember that many password crackers are loaded with dictionary words and common variations thereof (replacing a letter with a number, adding numbers after a word) - choosing a simple password makes your account is an easy target. Any secure password should be at least 8 characters in length, include letters (upper and lower case), numbers and even punctuation when possible. Below is a quick 5-step process for choosing a secure and memorable password:

  • Choose any word
  • Add two numbers to the end of the word at random
  • After the two numbers, add a punctuation mark or symbol such as: ! @ # $ % & * ( ) _ + - = [ ] \ { } | ; ' : " , . / ?
  • After the punctation mark, add another word related to the first
  • Choose one or more letters in your password and make them uppercase

For example, I like chocolate ice cream. I choose the number 38 at random, used an exclamation mark and made any letter "c" my password uppercase. The end result is ChoColate38!iCeCeam. It isn't very difficult to remember, but that would be extremely tricky to guess!

Do not answer any "secret question" with the correct answer.

Many websites (and even some banks) employ the "secret question" technique to verify your identity. Often, you can also reset your password by giving the answer to one of your secret questions. If you have a secret question that's easy to guess, having a secure password is moot; the secret question bypasses it completely. Even worse, the attacker could change your password once they break into your account locking you out!

The answer to this problem is to choose something unrelated to the question and use that for the answer. Make it obscure enough so that you can use the same answer all the time so you don't have to remember which nonsensical answer you choose for which question... For example:
What is your best friend's name? Spoon43.
What is your favourite food? Spoon43.
What was the name of the first street you lived on? Spoon43.
What is your mother's maiden name? Spoon43.

Be conscious of what you post publicly

Be careful of what you post online. Nobody thinks identity theft could ever happen to them, but happens much more often than you would expect. As well, with the rise in popularity of social networks it has become easier and easier to track people down and lift information from profiles.

  • Tighten down your privacy settings. Is there really a need to let everyone know about your personal life? Hide information that you don't want the world to see - your cell phone and home address are good examples. In Facebook's case, you also want to set all privacy settings to "Friends only".
  • Think about what you publish before you hit the button. As a general rule, don't publish to social networking sites or your blog what you wouldn't want everybody to know about you.

Do not store sensitive information without encryption

Encryption is a technique that turns information unreadable to anyone without a the key or passphrase. You should only store your sensitive data if it is encrypted as it will make it much more difficult for hackers to get at:

  • Mac OS X: All the tools you need are preinstalled. Open Disk Utility (in Applications > Utilities) and then select File > New > Blank disk image... from the menu. In the dialog that appears, select either the 128-bit (faster, less secure) or 256-bit (slower, more secure) AES methods.
  • Windows: Not all version of Windows support file encryption (Windows XP Home Edition doesn't, for example). However, you can download TrueCrypt for free. As of writing this, it supports Windows XP to Windows 7, both x32 and x64.

Additional information: How do the hackers get in?

There are many ways for them to break into your account. I've explained some of the common methods below:

Keyloggers

Keyloggers are a type of computer malware that people often call "a virus," but it is very different from your ordinary virus. Keyloggers infect your computer and show no symptoms; they will not make your computer slower, delete your document or crash programs. Instead, they record what you type on the keyboard and send it to the hacker who wrote the keylogger. For hackers, this is a very appealing method since it has the potential to not only catch your passwords, but also your credit card numbers, online banking PINs and more.

Malwarebytes Anti-Malware is a free tool that is extremely effective at removing malicious software from your computer. The scan only takes 10 or 15 minutes, so I recommend running a scan at least once a week. Remember to update (click the "Update" tab) before running a scan!

Social engineering

To quote Wikipedia, social engineering is "the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques." The spam messages you get from a fake "PayPal" or "Your online bank" asking you to visit some random site and enter your credit card and password to confirm your account are a good example of very basic social engineering. Since social engineering is based on sneaky and dirty tricks, it is also the hardest to prevent since there is no real solution other than keeping a watchful eye.

Brute force attacks

Brute force attacks break passwords by trying different combinations over and over again until it finds the right one. This is why having simple passwords based on dictionary words are bad, since it would be a trivial task to find by brute force.

Rating: 
Tags: 

v1 blog offline

My "v1" Joomla 1.0.15 blog is almost a year old now and support for 1.x has been phased out, so for security reasons I think it's a good idea to finally take it offline. I've been able to import the old content here and I've also setup URL remaps, so you shouldn't notice a thing. Although if you are having trouble with a specific URL, please leave a comment and I'll fix the hole in the regex remapping rules.

Rating: 

Some new features

My trial enabling node comments went pretty well, I did have to handle the inevitable comment spam but there was nothing outrageous - only about one bogus comment a day. With comments being published only after approval they're extremely easy to spot as well, since typically the spammer will post the same comment twice or more once they realize "hey, it hasn't appeared on the page yet!"

So because of comments are functioning well I've just enabled some new features for my blog - namely, you can now leave your name & homepage when you leave a comment, although due to homepage spamming I've disabled all homepage links in the site theme until I find a better solution. As well, you'll notice the new rating widget (thanks to VotingAPI and Fivestar) on every node - feel free to leave any feedback or ratings on any of the blog or tutorial posts. Thanks!

Rating: 

Coffee commercial

I was joking around with a friend today and remembered an old commercial from a few years ago that (I think?) was for Maxwell House... Somebody opens a sealed can of powdered coffee and music comes on: Smells fresh, fresh! Exciting... It's so exiting to me!"

I found the original song (by Kool & the Gang) that the commercial spoofs but I can't seem to find a video of the commercial anywhere. If you happen to find it, please drop a link in a comment!

Rating: 

What I've been up to

It's been a while since I last posted, school has kept me busy and away from leisure programming, so of course I have nothing to blog about now! ;)

I recently bought Parallels Desktop 5 - while I won't go into a full review now, it's worth mentioning that I was very impressed and if you're looking for a decent virtualization product, I highly recommend it. There are a few glitches when using Crystal or Coherence mode with Windows, but I prefer Windowed or Fullscreen mode anyways so I haven't had any problems at all really. It's been great to be able to boot up multiple OSs at once without ever leaving OS X and rebooting, and that's not to mention that testing software on various Linux distros became a whole lot easier too.

Anyways, after exams I'm planning on posting a tutorial on setting up a hosting server (including web, mail, awstats, webmail, cacti) from scratch. Check back during the holidays if you're interested!

Rating: 
Tags: 

On a scale of 1 (low) to 10 (best), how would you rate your cell phone carrier?

0: Terrible
12% (14 votes)
1-2: Poor
9% (11 votes)
3-4: Below average
15% (18 votes)
5-6: Decent
28% (33 votes)
7-8: Good
21% (25 votes)
9-10: Excellent
14% (17 votes)
Total votes: 118

* 0: Terrible
* 1-2: Poor
* 3-4: Below average
* 5-6: Decent
* 7-8: Good
* 9-10: Excellent

Who really is your cell phone service provider?

Although I haven't had any problems with my LG Rumor (aka LX260), I know it is one of the more troublesome phones so I've been expecting it to die soon. I currently have a texting plan with Virgin Mobile which has been working out great for me, but because it's a texting plan, it's short on minutes so for the past few months I've been paying overuse fees.

I've been looking around for other options, and this list from Wikipedia has been very handy: List of Canadian mobile phone companies.

Although I do realize that the Rogers has excellent coverage, I'm not going near them with a 10 foot pole... I'm going to compare my alternatives with the help of cellphones.ca.

Rating: 

The Yes Men - "Special Edition" New York Post

I came across the Yes Men's latest antics today: they have written their own New York Post fake all about climate change. The funny part is that even though the paper is a fake, the contents are completely factual. I think it's great! Check out the video below to see what people thought about the prank.

"SPECIAL EDITION" NEW YORK POST from The Yes Men on Vimeo.

Rating: