Blog


Thoughts on software development, security, technology, and philosophy.

Building an Automated IDOR/BOLA Detector

May 6, 2026

Building an Automated IDOR/BOLA Detector

Access control issues such as IDORs/BOLAs are a major issue. Rather than discovering these issues manually, attackers often take a different approach: they reuse large collections of previously observed URLs and probe them for inconsistent behavior. This raises an interesting question: can we use the same strategy defensively?

Read more →
Functional Options Pattern in Go

December 29, 2016 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Functional Options Pattern in Go

One of the many issues you'll encounter as a Golang developer is trying to make parameters to a function optional. In Go, the Functional Options Pattern, is a common solution to this problem. Here's how it works.

Read more →
Cross-Site Request Forgery: Demystified

January 26, 2014 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Cross-Site Request Forgery: Demystified

CSRF is amongst the most common vulnerabilities in websites, yet many developers have difficulty understanding the concept on how to prevent the vulnerability. Here we will attempt to clarify the concept and explain some of the potential solutions and outline the ones which work and the ones which don't.

Read more →
Binary, Booleans, and Bitwise Operations

September 4, 2011 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Binary, Booleans, and Bitwise Operations

Ever wonder about binary, Boolean algebra, and bitwise operations? All of computing can be broken down to the combination of these three topics, and there are many examples of their uses in the real world. In this article we'll dive into the basics of these three concepts and see how they're related and used in practical applications.

Read more →
Data Types

September 4, 2011 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Data Types

Data types are a vital component in any programming language, however, most people just take them for granted and don't really understand what they are or how they work. This article attempts to introduce the concepts around data types, and some of the more advanced ways to manipulate them.

Read more →
Interpolation

September 4, 2011 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Interpolation

An explanation of the definition of, process of computing, and uses of Interpolation in mathematics and numerical computing.

Read more →
Intro To Number Theory

September 4, 2011 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Intro To Number Theory

This article is intended to show a simple introduction into number theory, and give readers some insight into the applications of number theory in encryption.

Read more →
Scheme Programming I

September 4, 2011 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Scheme Programming I

A basic introduction to programming in functional programming language, Scheme.

Read more →
Scheme Programming II

September 4, 2011 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Scheme Programming II

A slightly deeper look at programming in Scheme. Explains iteration and recursion (information applicable for other languages as well).

Read more →
Scheme Programming III

September 4, 2011 · Originally published on halls-of-valhalla.org. Re-published on May 3, 2026.

Scheme Programming III

A look at how object-oriented programming can be possible with a basic functional programming language such as Scheme.

Read more →