B. Katz

Ranch Hand
+ Follow
since Aug 28, 2009
B. likes ...
Chrome Linux MyEclipse IDE
Cows and Likes
Total received
In last 30 days
Total given
Total received
Received in last 30 days
Total given
Given in last 30 days
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by B. Katz

Greetings Scott and Jeanne and welcome to the Ranch.

Hope you enjoy your visit and visit us again soon.

Welcome to the Ranch!

Glad to have you here! Hope you enjoy your stay!


2 years ago
Greetings Jim and August,

Silviu Burcea wrote:And the last one: we cannot prevent every single attack on Earth ... how much security effort means secure enough?

While there are no clear-cut definitions that state "If 'x' is your system, then 'y' is what you need to be secure...", during this race that the governments have been running to be at the top of the Cyber-powers, they have been coming up with some good guidelines to check against your own applications and systems to see how serious you should be about security, called FIPS-199. (Q.v. NIST FIPS-199 Final PDF)

In a nutshell, it checks three aspects of a given system/dataset/application, namely Confidentiality, Integrity and Availability, against what it would be like if any of those aspects were compromised, and gives a rating to how bad the damage would be considered.

That should give you a good base to start from as to how serious you should take the security of your applications and systems.

3 years ago

I know this is an older thread, but from the perspective of testing, sometimes it is helpful to open two instances of Internet Explorer with two different sets of credentials.

In such a situation, you can use one of the (in)famous "Undocumented Features" from Internet Explorer:

1. Open Internet Explorer.
2. Navigate to the site to be tested and log in under first set of credentials.
3. Open the "Run" dialog box. (Either "Win+R" or just the "Search for programs & files" at the bottom of the Win7 Start Menu)
4. In the dialog, type "iexplore /separate" and hit "Enter"
5. Navigate the new IE window to the site to be tested and log in under the second set of credentials.

What the "/separate" flag does for IE is open a new instance in a new memory space. The second window will know nothing of the state/session/cookies of the first window, and vice versa.

3 years ago

After all I've seen lately, not only does it seem Javascript has already gotten off the ground, but it seems to have taken flight in a *BIG* way.

Thanks again, Eric and Elisabeth for the new book and spending time with us!


Greetings Eric and Elisabeth,

Welcome to the ranch... Glad you could be here.

I wanted to thank you for your hard work!

Hope you enjoy your time here and come back to visit often.

Thanks again!
Greetings Josh and Michael,

Welcome to the Ranch! I certainly hope you enjoy your time here and come back to visit often, even after the promo is done.




It seems to me from the way that it was described in the "Essential JSP Expression Language" RefCardz on dzone.com that I should be able to use the "empty" operator to safely check the existence of a Context Environment variable. Am I reading that right?

Basically, my thought is something like this:
Given that *if* the variable "thisvar" exists in WEB-INF/web.xml in a Tomcat webapp, it would be defined as follows:

Then, from the JSP page, I should be able to check if it *does* exist, and if so, use it with something like this:

Does this seem right, or am I way off-base here?

TIA for your help.


4 years ago

Burk Hufnagel wrote:I did run out of space once, but it was on a personal board I'd made for use in a notebook, so it wasn't very big to begin with, and the post-its were a bit larger than necessary.

Hehe... which leads to another pro-con situation, right?
Using the 3"x3" post-its take up far more room than you generally need them to, but with the 2"x1.5" post-its, you run the risk of not being able to read what you wrote! hehe

And, thank you, Marcus for the pdf link above. I will use it the next time I try to discuss maintaining a proper software development cycle with the boss.
(It would be nice to actually have a project with specs and delivery dates instead of the usual "We need this new feature cut into the code... yesterday!" hehe)

Thanks again.
Greetings Marcus and Joakim,

Welcome to the Ranch. I hope you have a great time here and come back to visit us often.

I look forward to checking out the book. It looks like a welcome break from the typical paradigm I have to develop under. hehe

Thanks for your hard work and taking time to get us acquainted with it!


I think I would have to agree with Burk on this.

While I am new to BDD and it's implementation, I have been subject to the whims of the proverbial "moving target" project spec and the victim of project creep.

Getting all parties that have their own idea of what the application should look and feel like to sit down and all agree on one specification should cut down the common "Oh, no! We already promised it *this* way to the customer..." statement from ever coming up, hence cutting down on you having to go back and rewrite entire sections of the app you *just* finished!

HTH. Let us know.
4 years ago
Greetings Marco,

Welcome to the Ranch! I hope you enjoy your time here and come back to visit often!

milan chovatia wrote:Integer i3=10;
Integer i4=10;
if(i3 == i4)
System.out.println("they are same);
System.out.println("not same");

output: they are same

this is code part from book scjp6 by k&b and in that it says "in order to save memory instances of wrapper objects are always == when their primitive values are same."
but when i am running code i am getting output "not same".....
please someone can explain it....

Something that catches my eye here:

"in order to save memory instances of wrapper objects are always == when their primitive values are same."

Correct me if I am wrong, but I'm under the impression that an Integer is not a primitive int. Am I correct?
4 years ago
Greetings Roman,

Welcome to the Ranch. Hope you have a great time here and come back to visit us often.

And, from the initial sounds of it, more info on BrainLeg is exactly what I need... Because, trying to teach a tech support guy how to get the relevant info from a Java Exception stacktrace is ofttimes exasperating!

As a note, I just gave the Exception Search a spin.... NICE!!! VERY nice!! That is slick. I'll likely be bringing a project over in the VERY near future.

Thanks for all your hard work.
4 years ago

Well, you have the class, java.net.InetAddress, now you need the method. For example:

... where "4000" is the timeout.

HTH. Let us know.