I talked about some of Haskell’s type system features. You can find a write-up of my talk on my personal blog.
Monthly Archives: January 2013
A stupidly easy way to hack into computers
Do you have a SSH server running somewhere? Have you ever wondered why it gets hammered by brute-force password guess attacks all the time? My server got 4669 login attempts on 2013-01-12. Have you ever wondered what these guys do if they actually manage to get into your server? Have you ever wondered which passwords actually get tried, in order not to use them yourself?
SSL, man-in-the-middle attacks and root CAs
This post explains how your employer might have access to all your SSL-encrypted communication, including for example the internet bank.
Normalization-by-evaluation continued
Today I carried on talking about NBE.
Normalization-by-evaluation
Today I talked about normalization-by-evaluation for simply typed lambda calculus. Continue reading
Natural semantics for call-by-need
Happy new year! Today was the first theory lunch of 2013 and I talked about lazy, or call-by-need evaluation. Continue reading