#error-handling

[ follow ]
Information security
fromThe Hacker News
6 hours ago

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors exploit HTTP cookies for PHP web shells on Linux servers, enabling remote code execution with stealthy control mechanisms.
Software development
fromMedium
1 day ago

Zero-Effort Production Debugging: How I Automated Bug Fixes for My Side Project

Automating bug fixes with an AI agent streamlines maintenance for full-stack applications, enabling zero-effort management of errors.
DevOps
fromInfoQ
3 hours ago

Replacing Database Sequences at Scale Without Breaking 100+ Services

Validating requirements can simplify complex problems, and embedding sequence generation reduces network calls, enhancing performance and reliability.
Roam Research
fromArs Technica
1 day ago

New Rowhammer attacks give complete control of machines running Nvidia GPUs

Rowhammer attacks on Nvidia GPUs can compromise CPU memory, allowing full control of host machines.
#pytest
Web frameworks
fromInfoWorld
2 days ago

PEP 816: How Python is getting serious about Wasm

Python will now formally support WebAssembly standards through PEP 816, enhancing its usability in browser applications.
Node JS
fromInfoQ
4 days ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
Gadgets
fromTheregister
1 week ago

Engineer sabotaged PC then complained when it didn't work

Ewen faced challenges with a fiber-optic device that produced faulty data, leading to a long drive to troubleshoot the issue.
Software development
fromDevOps.com
1 day ago

Why Code Validation is the Next Frontier - DevOps.com

Shared staging environments are inadequate for modern development; isolated, on-demand setups are needed for effective validation.
Information security
fromSiliconANGLE
3 days ago

Hackers compromise popular Axios Javascript library with hidden malware - SiliconANGLE

Axios HTTP client library was hacked to distribute malware via a compromised npm account, affecting multiple operating systems.
DevOps
fromInfoQ
3 days ago

Failure As a Means to Build Resilient Software Systems: A Conversation with Lorin Hochstein

Using software failures can enhance software architecture and reliability engineering practices.
Scala
fromMedium
1 week ago

Breaking Scala's Nil with Java Reflection

Java reflection in Spring Data MongoDB caused a bug in Scala's Nil singleton, revealing a mismatch between Scala's guarantees and JVM behavior.
#windows-11
Tech industry
fromInfoWorld
1 week ago

When Windows 11 sneezes, Azure catches cold

Windows 11 backlash may weaken Microsoft's overall ecosystem, impacting Azure's appeal and enterprise trust in the Microsoft stack.
Software development
fromTheregister
1 week ago

Windows boss promises to heal the operating system's wounds

Microsoft promises improvements to Windows 11, addressing user frustrations with bugs and AI integration, but lacks genuine apologies for past issues.
Software development
fromTechzine Global
15 hours ago

Cursor updates its platform with a focus on autonomous AI agents

Cursor 3 enhances software development by integrating AI agents for collaborative coding, reducing manual programming and streamlining workflows.
fromRubyflow
1 week ago

The tool I wish I had 25 apps ago

Every iOS app I've shipped over the last nine years started the same way: a Rails developer with a great web app, users who want it in the App Store, and weeks spent on Xcode, signing certificates, and Swift boilerplate that has nothing to do with the actual product.
Information security
fromComputerWeekly.com
3 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Java
fromInfoWorld
2 weeks ago

9 reasons Java is still great

Java maintains prominence through balancing stability with innovation, community-driven governance via the Java Community Process, and continuous evolution incorporating functional programming, concurrency, and cloud computing advances.
#microsoft
Web development
fromTheregister
2 weeks ago

Brilliant backups landed web developer in big trouble

A website migration oversight caused a two-year disconnect where office staff viewed outdated content due to hardcoded DNS settings, while the client only discovered the issue when accessing the site from the office.
Artificial intelligence
fromMedium
2 weeks ago

The AI Coding Pitfalls Report: Facts, Trivia, and Structural Solutions

Engineers must shift from treating LLMs as chatbots to treating them as compilers, implementing a dedicated diagnostic phase to identify AI-specific defects before code merges.
Software development
fromZDNET
1 day ago

I built two apps with just my voice and a mouse - are IDEs already obsolete?

AI coding transforms development by replacing traditional editing and debugging with instructive guidance.
Software development
fromInfoWorld
2 days ago

Vim and GNU Emacs: Claude Code helpfully found zero-day exploits for both

LLMs can quickly identify security vulnerabilities in code, but their rapid evolution poses potential risks.
Business
fromHelen Min
1 month ago

Software isn't dying, but it is becoming more honest - Helen Min

SaaS's subscription-based billing model is evolving beyond fixed seat-based pricing toward usage-based and outcome-based billing models that better align costs with actual value delivered.
#claude-code
UX design
fromMedium
3 weeks ago

Claude Code Best Practices

Plan before executing when using Claude Code to avoid spending excessive time fixing errors and redirecting the AI toward correct solutions.
UX design
fromMedium
3 weeks ago

Claude Code Best Practices

Plan before executing when using Claude Code to avoid spending excessive time fixing errors and redirecting the AI toward correct solutions.
fromInfoWorld
3 weeks ago

Microsoft's .NET 11 Preview 2 offers cleaner stack traces

New overloads on TarFile.CreateFromDirectory accept a TarEntryFormat parameter, giving direct control over the archive format. Previously, CreateFromDirectory produced Pax archives. The new overloads support all four tar formats—Pax, Ustar, GNU, and V7—for compatibility with specific tools and environments.
Web frameworks
Data science
fromInfoWorld
4 weeks ago

The revenge of SQL: How a 50-year-old language reinvents itself

SQL has experienced a major comeback driven by SQLite in browsers, improved language tools, and PostgreSQL's jsonb type, making it both traditional and exciting for modern development.
Artificial intelligence
fromZDNET
3 weeks ago

AI is getting scary good at finding hidden software bugs - even in decades-old code

AI models can effectively identify decades-old bugs in legacy code, but this capability also enables hackers to exploit vulnerabilities in deployed systems.
Software development
fromArs Technica
1 week ago

Mozilla dev's "Stack Overflow for agents" targets a key weakness in coding AI

cq aims to enhance coding agents' efficiency by enabling knowledge sharing and addressing outdated information and resource consumption issues.
fromInfoWorld
2 weeks ago

Stop using AI to submit bug reports, says Google

The Google Open Source Software Vulnerability Reward Program team is increasingly concerned about the low quality of some AI-generated bug submissions, with many including hallucinations about how a vulnerability can be triggered or reporting bugs with little security impact.
Software development
Software development
fromMedium
2 weeks ago

From Concept to Production: The Complete Guide to XML Prompt Engineering for Software Developers

Treat LLMs as compilers, not chatbots, using Structured XML Prompting to generate professional-grade code through a five-stage AI-assisted development cycle with rigid constraints.
Software development
fromInfoWorld
3 weeks ago

The AI coding hangover

Replacing developers with LLMs creates brittle, unmaintainable systems with hidden costs rather than eliminating complexity, as enterprises discover engineering judgment cannot be automated away.
Philosophy
fromMedium
1 month ago

Why code is not the source of truth

Design specifications and blueprints, not implementation code, are the authoritative source of truth; implementation is derived from and judged against originating design authority.
Software development
fromInfoWorld
3 weeks ago

Coding for agents

AI agents reward explicit, consistent, well-documented code over clever or personally-preferred approaches, fundamentally changing software engineering standards toward machine-legibility.
fromTechzine Global
1 month ago

Go developer questions effectiveness of Dependabot

Dependabot sounded the alarm on a large scale. Thousands of repositories automatically received pull requests and warnings, including a high vulnerability score and signals about possible compatibility issues. According to Valsorda, this shows that the tool mainly checks whether a dependency is present, without analyzing whether the vulnerable code is actually accessible within a project.
Information security
#rust
fromwww.sitepoint.com
2 months ago

Software Development

1. What Are the Key Features Every Modern Business Website Should Have Today? Perfect for UX, performance, and custom web development discussion.
Web design
Software development
fromFuturism
3 weeks ago

Entirely Vibe-Coded Operating System Is a Bug-Filled Disaster

Vibe-coded software development produces non-functional results, as demonstrated by Vib-OS, an entirely AI-generated operating system that is buggy and largely unusable despite claimed features.
fromDevOps.com
1 month ago

Survey Surfaces Massive Amount of Java Technical Debt

A global survey of 2,039 Java developers published today finds 63% reporting that dead and unused code adversely affects their team's productivity, with 22% describing the impact of that technical debt as being severe. Conducted by Dimensional Research on behalf of Azul, a provider of a distribution of OpenJDK, the survey also finds that more than half (56%) now deal with a Common Vulnerability and Exposure (CVE) involving Java on a daily or weekly basis.
Java
Scala
fromMedium
3 months ago

Why Metaprogramming Usually Makes Things Worse

Metaprogramming tools like macros and templates are rarely necessary and often harmful, increasing compilation costs, complexity, and slowing development feedback loops.
Gadgets
fromTheregister
2 months ago

Engineer caused data loss by cleaning PCs with welding tools

A structural engineer destroyed five AutoCAD PCs by using oil-laden compressed air and acetone, causing hardware failure and loss of engineering files.
Software development
fromDevOps.com
4 weeks ago

When AI Gets It Wrong: The Insecure Defaults Lurking in Your Code - DevOps.com

Generative AI accelerates code development but introduces security vulnerabilities because AI models learn insecure patterns from training data rather than understanding security principles.
UX design
fromIshadeed
1 month ago

The Too Early Breakpoint

Avoid switching to a mobile layout before available space requires it to preserve design integrity and ensure truly responsive CSS.
Software development
frominfiniteundo.com
4 weeks ago

Falsehoods programmers believe about time

Common programming bugs stem from widespread misconceptions about how computers and calendars handle time, including daylight savings, leap years, and clock synchronization issues.
Gadgets
fromTheregister
1 month ago

Microsoft admits Windows hibernation fix didn't fully work

Windows update caused hibernation failures on Secure Launch PCs with VSM; out-of-band fix didn't resolve all cases and a future Windows update is required.
fromSecurityWeek
1 month ago

How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development

This extends to the software development community, which is seeing a near-ubiquitous presence of AI-coding assistants as teams face pressures to generate more output in less time. While the huge spike in efficiencies greatly helps them, these teams too often fail to incorporate adequate safety controls and practices into AI deployments. The resulting risks leave their organizations exposed, and developers will struggle to backtrack in tracing and identifying where - and how - a security gap occurred.
Artificial intelligence
fromTheregister
1 month ago

Server crashes traced to one very literal knee-jerk reaction

It was the time of Novell networks, RG58 cables, and bulky tower PCs. It was also a time before the telemarketer's IT department employed specialists. Carter and his two colleagues - boss Mike and part-time student Stefan - therefore handled tasks ranging from programming to support, and everything in between.
Software development
fromPythonbytes
2 months ago

Stack Overflow is Cooked

port-killer A powerful cross-platform port management tool for developers. Monitor ports, manage Kubernetes port forwards, integrate Cloudflare Tunnels, and kill processes with one click. Features: 🔍 Auto-discovers all listening TCP ports ⚡ One-click process termination (graceful + force kill) 🔄 Auto-refresh with configurable interval 🔎 Search and filter by port number or process name ⭐ Favorites for quick access to important ports 👁️ Watched ports with notifications 📂 Smart categorization (Web Server, Database, Development, System)
Python
fromPythonbytes
2 months ago

Malicious Package? No Build For You!

Charlie Marsh announced the Beta release of ty on Dec 16 "designed as an alternative to tools like mypy, Pyright, and Pylance." Extremely fast even from first run Successive runs are incremental, only rerunning necessary computations as a user edits a file or function. This allows live updates.
DevOps
Artificial intelligence
fromInfoWorld
2 months ago

Output from vibe coding tools prone to critical security flaws, study finds

Popular AI code-generation tools frequently produce insecure code, including critical API authorization and business-logic vulnerabilities, requiring careful debugging and context-aware review.
Software development
fromInfoWorld
1 month ago

The reliability cost of default timeouts

Unbounded waiting in distributed systems causes slowness to manifest as outages before traditional failure detection triggers, draining capacity and degrading user experience.
Artificial intelligence
fromInfoQ
1 month ago

Working with Code Assistants: The Skeleton Architecture

Combining Vertical Slice architecture with Dependency Inversion and a Skeleton of base classes constrains AI code assistants' context, producing safer, consistent, and maintainable generated code.
Artificial intelligence
fromMedium
3 months ago

Engineering After AI: Why Writing Code Is No Longer the Hard Part

Generative AI makes building cheap, shifting engineering's core work from constructing systems to upstream thinking, problem definition, and accepting responsibility for outcomes.
Information security
fromTheregister
1 month ago

Techie's one ring brought darkness by shorting a server

A technician wearing a wedding ring shorted a server board, causing an outage, briefly concealed the failure, and service resumed after an unexpected reboot.
fromDevOps.com
1 month ago

4 Security Risks of AI Code Assistants - DevOps.com

They are often trained on public domain code, which can be secure or insecure. The AI coding assistant is not able to identify which is which. It also rewrites code from these sources without noticing any logical issues that might exist. AI is rewarded based on whether it completes a task, not if it is done well, so it might create code that is not secure or without necessary security controls.
Artificial intelligence
Information security
fromTechzine Global
2 months ago

Misuse of VS Code tasks poses risk to developers

VS Code tasks.json can automatically run commands when a folder is opened, enabling supply-chain attacks that execute malicious, persistent code across platforms.
Information security
fromDroids On Roids
2 months ago

When ZeroWidth Isn't Zero: How I Found and Fixed a Vulnerability | Blog

Unicode Variation Selectors can inflate UTF-16 storage size while still passing perceived-length checks, enabling payload injection, performance issues, and possible database crashes.
fromTheregister
2 months ago

Old Windows quirks help punch through new admin defenses

The issue focuses on how Windows handles these directories for specific user sessions. Because the kernel creates a DOS device object directory on demand, rather than at login, it cannot check whether the user is an admin during the creation process. Unlike UAC, Administrator Protection uses a hidden shadow admin account whose token handle can be returned by the system when calling the NtQueryInformationToken API function.
Information security
Software development
fromMedium
1 month ago

I Can't Believe Rust Is Replacing Java

The X recommendation system was fully rewritten and open-sourced using only Rust and Python, replacing previous Java and Scala implementations.
fromTheregister
1 month ago

VS Code for Linux may be secretly hoarding trashed files

The reason for this is Snap - a Linux application packaging format - creates a local Trash folder for each VS Code version, one that's separate from the system-managed Trash, according to a VS Code bug report dating back to November 11, 2024. Not only that, but Snap keeps older versions of VS Code after updates, potentially multiplying the number of local Trash folders and the trashed-but-not-deleted files therein. Emptying the system Trash folder doesn't affect the local instances.
Software development
Software development
fromInfoWorld
2 months ago

Is code a cow path?

AI coding agents will progressively assume writing, reviewing, and testing roles, potentially eliminating the need for human review and traditional code artifacts.
#ai-generated-code
Software development
fromZDNET
2 months ago

I used GPT-5.2-Codex to find a mystery bug and hosting nightmare - it was beyond fast

A $20 ChatGPT Plus plan with Codex can diagnose and fix real-world WordPress plugin bugs and hosting issues, saving developer time.
fromInfoWorld
2 months ago

Which development platforms and tools should you learn now?

Software development used to be simpler, with fewer choices about which platforms and languages to learn. You were either a Java, .NET, or LAMP developer. You focused on AWS, Azure, or Google Cloud. Full-stack developers learned the intricacies of selected JavaScript frameworks, relational databases, and CI/CD tools. In the best of times, developers advanced their technology skills with their employer's funding and time to experiment. They attended conferences, took courses, and learned the low-code development platforms their employers invested in.
Software development
Software development
fromMedium
2 months ago

Why Your System Shows Old Data: A Practical Guide to Cache Invalidation

Caching introduces multiple truths; without correct cache invalidation users will receive stale data and silently lose trust.
fromMedium
1 month ago

Test smart: how to solve dilemmas as QA?

To find the typical example, just observe an average stand-up meeting. The ones who talk more get all the attention. In her article, software engineer Priyanka Jain tells the story of two colleagues assigned the same task. One posted updates, asked questions, and collaborated loudly. The other stayed silent and shipped clean code. Both delivered. Yet only one was praised as a "great team player."
Software development
Software development
fromPybites
2 months ago

7 Software Engineering Fixes To Advance As A Developer - Pybites

Finish one practical project and adopt system-level skills, feedback loops, and mindset shifts to move from hobbyist coding to professional software engineering.
Software development
fromInfoWorld
2 months ago

Go developers mixed on AI coding tools - survey

Most Go developers use AI-powered development tools, but satisfaction with those tools is moderate; 91% report satisfaction with the Go language.
[ Load more ]