April 25, 2023, 9:57 a.m. | PJ Fanning

System Weakness - Medium systemweakness.com

Photo by Mika Baumeister on Unsplash

Any application that takes inputs from potentially untrusted sources should be investigated in case they are susceptible to Denial of Service attacks.

I’m writing this based on some work I’ve been doing on Java based applications. The built-in code in Java for parsing numbers has subquadratic performance. Trying to parse a number with hundreds or thousands of digits can take a lot longer than you might expect. Your trusted users might be sending you …

application applications attacks case code denial of service denial of service attack doing dos expect inputs jackson java json malicious numbers parsing performance photo send service untrusted work writing yaml

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden