Blog

About security

Security protects the system against threats such as unauthorized access and modification. Therefore, it must answer the following questions: who is the user accessing the system, what can he/she do with it and, finally, what has he/she done with it?

Read more

Cloning

Framework Design Guidelines advise against implementing ICloneable or even using it in public APIs mostly because this interface does not specify whether the copy is deep or shallow. Can we do better?

Read more