Code

Fork Bomb

For most of my working life I have dealt with system failure. To understand failure in systems we need to understand weakness, we tend to call most of these weaknesses vulnerabilities. All systems are vulnerable one way or another. One of the most interesting is inherent vulnerability. Enter the Fork Read more…

By Paul Birch, ago
Code

Three-Way Handshake

I have always been fascinated with data communication. In the early days of the internet I devoted most of my time on the TCPIP standard, living and breathing the protocol. There were other standards around at the time, IPX/SPX, SNA and DECnet but it wasn’t long before TCP/IP became the Read more…

By Paul Birch, ago
Code

Under The Hood

I love looking under the hood. If I were a car mechanic the creases of my hands would be black with oil. I have a passion for operating systems, from supercomputers to nanobots, the weirder the better. In the early days, I used to lift the hood and say “Whoa, Read more…

By Paul Birch, ago
Code

Bin True

Once upon a time I fancied myself as a coder. In the early 80’s I spent hours in a local computer shop writing an ASCII program to make a bird fly across the screen of an Amstrad computer. I couldn’t afford the computer so I would come into the shop Read more…

By Paul Birch, ago
Code

Migrate And Boot

The term “pull yourself up by your bootstraps”, which of course is completely impossible, first came into use around 1860. In computing, the ‘bootstrap’ is a chain of events that results in the core (kernel) of the operating system loading into memory. This chain of events starts small with testing Read more…

By Paul Birch, ago