164: SCTP vs. TCP vs. UDP

164: SCTP vs. TCP vs. UDP

https://www.takeupcode.com/podcast-player/595/164-sctp-vs-tcp-vs-udp.mp3Download file | Play in new window | Duration: 8:19 | Recorded on January 1, 2017You’ll learn more about the strengths of the SCTP, TCP, and UDP protocols by comparing them. The audio...
173: HMAC: Keyed Hashed Message Authentication Code.

173: HMAC: Keyed Hashed Message Authentication Code.

https://www.takeupcode.com/podcast-player/604/173-hmac-keyed-hashed-message-authentication-code.mp3Download file | Play in new window | Duration: 9:13 | Recorded on March 5, 2017How do you stop an attacker from just changing a hash? In the previous episode, I...
QA Friday 2016-Jan-08

QA Friday 2016-Jan-08

https://www.takeupcode.com/podcast-player/352/qa-friday-2016-jan-08.mp3Download file | Play in new window | Duration: 10:57 | Recorded on January 7, 2016What are denial of service attacks? This week has been a rough week for the Take Up Code website and that has...
QA Friday 2016-Jan-15

QA Friday 2016-Jan-15

https://www.takeupcode.com/podcast-player/366/qa-friday-2016-jan-15.mp3Download file | Play in new window | Duration: 12:01 | Recorded on January 14, 2016How can you prevent denial of service attacks? Most of the techniques you’ll use to prevent a DOS attack are...
43: Collections: Hash Table.

43: Collections: Hash Table.

https://www.takeupcode.com/podcast-player/379/43-collections-hash-table.mp3Download file | Play in new window | Duration: 10:08 | Recorded on January 24, 2016You’ll need to be able to work with groups or collections of items. A game that only has one character...
70: Design Patterns: Proxy.

70: Design Patterns: Proxy.

https://www.takeupcode.com/podcast-player/423/70-design-patterns-proxy.mp3Download file | Play in new window | Duration: 9:24 | Recorded on March 9, 2016The proxy structural pattern introduces another object that your code uses instead of the actual object. This might...
QA Friday 2016-Mar-25

QA Friday 2016-Mar-25

https://www.takeupcode.com/podcast-player/436/qa-friday-2016-mar-25.mp3Download file | Play in new window | Duration: 9:53 | Recorded on March 24, 2016What is identity? This episode describes identity and authentication. Authentication is the process you go through to...
228: Filesystem: What Can They Do? Part 2.

228: Filesystem: What Can They Do? Part 2.

https://www.takeupcode.com/podcast-player/693/228-filesystem-can-part-2.mp3Download file | Play in new window | Duration: 9:42 | Recorded on March 25, 2018Security is a big part of filesystems. This episode will explain how traditional file system security works for...
229: Filesystem: What Can They Do? Part 3.

229: Filesystem: What Can They Do? Part 3.

https://www.takeupcode.com/podcast-player/694/229-filesystem-can-part-3.mp3Download file | Play in new window | Duration: 13:06 | Recorded on April 1, 2018Access control lists provide more security options. The previous episode described the traditional security model...
109: Data Types: Ints Part 2.

109: Data Types: Ints Part 2.

https://www.takeupcode.com/podcast-player/483/109-data-types-ints-part-2.mp3Download file | Play in new window | Duration: 16:40 | Recorded on May 17, 2016You’ll probably have one or more ints in almost every method and class you write. They’re everywhere...
115: Data Types: Strings Part 2.

115: Data Types: Strings Part 2.

https://www.takeupcode.com/podcast-player/498/115-data-types-strings-part-2.mp3Download file | Play in new window | Duration: 15:28 | Recorded on May 29, 2016You need more than a bunch of numbers and logic to write an application. You need text and working with...