Author Archives: George Valentin Voina

Docker: Create your own private Docker registry

By | October 24, 2016

Docker is a nice low-cost virtualization solution that is more and more popular. A very nice use case is to use it to create images of enterprise systems, images that can be used for testing without having to bother to delete databases and reinitialize testing environment. You just simply have to fire up another set… Read More »

Blog Links: SQL Server Tricks and Tips

By | February 8, 2017

The following are some interesting SQL Server related links: A lot of times you have to relocate the data and log files of a SQL Server. It can be that the default installation was not OK or you change the storage. The following tutorial is very useful Move System Databases Using SQL Server with R… Read More »

Glassfish: Resource monitoring from command line

By | February 8, 2017

Glassfish Application server is a powerful application server that can support medium to big enterprise environments. It is one of the easiest to configure and maintain application servers. No jumping through loops is required to adapt the code of your enterprise application to be deployable on it. I am an adept of command line. Because… Read More »

Blog Links: Server Backup with open source tools

By | February 8, 2017

There are lots of expensive backup tools that can be used to back-up an enterprise environment. HP and IBM are leaders of this market but the costs can go very high quickly. As an alternative one can choose some open-source backup suites that are on par with the commercial ones. Bacula Bacula is a very… Read More »

JavaEE: Caching costly data across a transaction with TransactionSynchronizationRegistry

By | February 8, 2017

Everybody knows that a database query is extremely costly in enterprise application and usually has the biggest impact in process time of a transaction. There are plenty of best practice rules a developer has to follow: 1. Retrieve as much data as possible in a single query, avoid to make a data retrieve from the… Read More »

Hibernate: Avoiding a “fake” exception: javax.persistence.TransactionRequiredException: Executing an update/delete query

By | October 21, 2017

I encountered some weird issue caused by the way Hibernate works. The exception messages returned by Hibernate are confusing as they are just a side-effect of the real issue. The code in question was something like that: In a manager bean we have the following: @Stateless(name = “ObjectManagerBean”, mappedName = “ObjectManagerBean/remote”) public class ObjectManagerBean …… Read More »

Blog Links: Web site security

By | November 11, 2016

I already had several posts related to constructing a secure website that can be released in the wild world-wide web. The following are several resources and links that will give a good idea on what one can do in order to secure a web site. First we need a way to analyse how secure our… Read More »

Blog Links: Hacking MSSQL, a strong case for implementing PCI

By | February 8, 2017

A fabulous piece from Rick Osgood on Hacking Microsoft SQL Server Without a Password. Using a man in the middle attach and ARP spoofing with a combination of free tools like Wireshark, Ettercap filters is able to hijack the SQL connection and execute arbitrary queries instead of the real queries. He manages even to create… Read More »

Blog Links: Resources for old WRT routers

By | September 1, 2016

I own several old WRT routers and they still can be used for having fun. The following is a list of resources I frequently use. Must have reference to WRTRouters How to Recover from a bad flash The main resources site for Open WRT Hardware list for Linksys WRT54G, WRT54GL and WRT54GS An interesting forum… Read More »