News

Android Bluetooth SPP / RS232 with Delphi XE5 YouTube video and examples

I found this great Delphi XE5 Android Bluetooth YouTube video, byBjörn Hansen, from back in September last year after the launch of Delphi XE5. it shows you how to use Delphi to create an Android app that uses Bluetooth to connect to a lighting control system. The developer includes the source code for the example that also includes a Android Bluetooth Delphi interface unit version of the…
Read more
News

Setting Text Parameters in FireMonkey

Author: Сергей One of small but rather useful new features of FireMonkey introduced in XE3 version is the FMX.Types.ITextSettings interface. Often we need to change some parameters of an output text for a component, which class is not known a priori. For example, a…
News

YAML and Remote Code Execution

Author: Craig Stuntz YAML’s security risks are in no way limited to Rails or Ruby. YAML documents should be treated as executable code and firewalled accordingly. Deserializing arbitrary types is user-controlled, arbitrary code execution. It’s Not Just Ruby A few weeks ago, I had a need to parse Jasmine’s jasmine.yml in some C# code. I spent some time looking at existing YAML…
Read more
News

Installing Sonar for Delphi

Author: Miguel Angel Oliver On15th of November the HTML5 Builder QA Team was in the VLCTesting where welearned very good experiences and shared knowledge, amongst this was the software Sonar,Right now in HTML5 Builder we are not using that tool but we…
News

Why Won't Visual Studio Step Into This Code?

Author: Craig Stuntz I helped another developer debug an interesting problem this morning. Let’s see if you can spot the problem. The code in question looked something like this simplified version containing only enough code to show the problem: public void Execute() { DoStuff(); // breakpoint 1 } public IEnumerable<Coordinate> DoStuff() { …
Read more
News

A Math Primer for Gentry's Fully Homomorphic Encryption

Author: Craig Stuntz A couple of weeks ago, I wrote What Is Homomorphic Encryption, and Why Should I Care? In that post, I promised to share my C# implementation of the algorithm from Craig Gentry’s CACM article. Before I can do that, though, I need to explain some of the math involved. Perhaps surprisingly, it’s actually very simple. (I say “surprisingly” because much of…
Read more