Perl Mongers' Site

Houston.pm

🌐
Content About πŸ—ΊοΈ
❓
πŸ”‘

Design Hack πŸ”— 1508544000  

October 2017
Presenter: Julian Brown
Julian Brown ran a session where the attendees worked on the initial design brainstorming for a project. We started with an idea proposed by Michael Davis for a PSGI package that would set up a web service with minimal configuration.

Web Framework Comparisons πŸ”— 1505952000  

September 2017
Presenter: Various
Three different people demonstrated different approaches to developing a web application. One showed a Dancer-based note taking app. Another showed how mod_perl has different trade-offs than a framework. The last showed a simple single page CGI script. Then, we saw info about an attack on suid. The final presentation talked about Perl's minimum perfect hashes.

Gray-ish Hat Adventures In Automating Mobile Game Play: Why Tap When You Could Automate? πŸ”— 1503273600  

August 2017
Presenter: Robert Stone
Robert Stone describes the troubleshooting techniques he used to reverse engineer a game to see if he could automate some of the boring parts of the game.

Getting gutsy with perl5 πŸ”— 1500595200  

July 2017
Presenter: Todd Rinaldo
Todd Rinaldo has been working on the guts of Perl recently as part of the Perl compiler project at cPanel. This talk covers some of what he has learned about working with the internals of perl.

OC.pm Coding challenge πŸ”— 1498003200  

June 2017
Presenter: Various
JD Lightsey suggested that the group make an attempt at the Perl Programming challenge that OC.pm proposed for their May 2017 meeting. Eveyone was suggested to make an attempt.

Live Code Reviews πŸ”— 1495324800  

May 2017
Presenter: Various
The goal this meeting was to do some code reviews as a group. The idea was that we would learn from each other's techniques and knowledge.

p5hack πŸ”— 1492732800  

April 2017
Topic: p5hack
Presenter: Todd Rinaldo
Todd Rinaldo discussed the p5hack hack-a-thon this year in Amsterdam. He described the purpose of the meeting and some of the decisions that came out of the meeting.

Maintaining Developer Mental and Physical Health πŸ”— 1490054400  

March 2017
Presenter: Various
Jim Bacon, Robert Stone, and Jocelyn Kirby gave short presentations on health topics that can apply to developers.

Homophonic Substitution Cipher: Cracking the Code of a Killer πŸ”— 1487635200  

February 2017
Presenter: Robert Stone
Robert Stone delves into the cipher used by the Zodiac Killer in his newspaper announcements. He describes substitution ciphers and then shows how a homophonic substitution cipher fixes many of its problems. He ends by describing how the Zodiac Killer's cipher was solved.

cperl πŸ”— 1484956800  

January 2017
Topic: cperl
Presenter: Reini Urban
Reini Urban gave a presentation highlighting several of the features of the cperl fork of the perl programming language.

How Functional Programming Made Me Better at Perl πŸ”— 1477008000  

October 2016
Presenter: Mark Allen
Mark Allen discusses the way doing functional programming in Erlang has changed how he approaches problems. He then introduced how to use some of this insight in Perl.

The Read Copy Update Pattern in the Linux Kernel πŸ”— 1474416000  

September 2016
Presenter: Julian Brown
Continuing with the lock-free architecture topic Julian introduced at an earlier meeting, he covered the Read-Copy-Update strategy.

A Set of Short Talks πŸ”— 1471737600  

August 2016
Presenter: Various
This month's meeting features a group of 4 short talks by some of our long-time members. Robert Stone discusses connecting objects by reference versus indirectly by some ID. Julian Brown talked about lock-free architectures. J. D. Lightsey demonstrated another SQL injection attack using sqlmap. And, Todd Rinaldo rounds out the talks with a discussion of a Perl vulnerability related to @INC.

Reconstructing an SQL injection from its fix πŸ”— 1466467200  

June 2016
Presenter: John Lightsey
John Lightsey shows how to use a diff of changes made to fix an SQL injection attack to create an attack against the unpatched code. He shows the use of the sqlmap tool to automatically generate useful attacks.

Binary Tree Serialization Techniques πŸ”— 1463788800  

May 2016
Presenter: Chris Mevissen
Chris Mevissen gave a report on the research he has been doing on serializable binary trees. He describes the basics of binary tree data structures and descibes a basic implementation in Perl. He works his way through showing how a binary tree can be serialized in a form that can be easily reloaded.

FlexSC: Exception-Less System Calls πŸ”— 1461196800  

April 2016
Presenter: Julian Brown
Julian Brown covered a presentation describing a method for doing system calls while reducing context switching overhead. The paper the presentation was based on covered an academic project to implement this method and the research showing its effectiveness.

Algorithmic Complexity Made Simple πŸ”— 1458518400  

March
Presenter: G. Wade Johnson
G. Wade Johnson introduced the idea that analyzing the complexity of algorithms is more than just an academic exercise. He shows how to do relatively simple analysis for quick wins.

Solving Wordbrain πŸ”— 1456012800  

February 2016
Presenter: Robert Stone
Wordbrain is a puzzle game that involves using letters presented in a clue to created words. Robert Stone describes creating a solver for this game and explores techniques for improving the performance of the solver.

Adding Forks to Your Perly Tableware πŸ”— 1453334400  

January 2016
Presenter: Julian Brown
Julian Brown used a presentation written by Steven Lembark. The presentation covered unpack and forking in Perl. Julian described a problem that he had been trying to solve and how the information in this talk would have been helpful.

Show and Tell with Role::Tiny and CGI::Application::DispatchUTF-8 and Perl πŸ”— 1445385600  

October 2015
Presenter: Jim Bacon
Jim Bacon gave a remote presentation describing how he used applied Roles to adapt a CGI::Application-based webapp to support a versioned API.
Presenter: Todd Rinaldo
Todd Rinaldo followed this with a presentation describing what Pelr programmers should know about UTF-8 including information about various gotchas.

Time Progressions with string and DateTimeFrom YAPC::EU@Houston.pm πŸ”— 1442793600  

September 2015
Presenter: Julian Brown
Julian Brown showed how he summarizes currency trades from a delayed Forex feed into different groupings. His method involves both string manipulation and use of the DateTime module.
Presenter: Nicolas Rochelemagne
Nicolas Rochelemagne summarized the presentations he saw at this year's YAPC::EU. The talks spanned a fairly large spectrum of topics.

A Metasploit module for Locale::Maketext format string attack πŸ”— 1440115200  

August 2015
Presenter: John Lightsey
This was the second in a series that JD has done on Metasploit modules attacking vulnerabilities in Perl code. This presentation focused on problems with the Locale::Maketext module. JD shows background on the flaw, how it manifests in Locale::Maketext, and the module he built to perform the exploit.

Perl List Operations πŸ”— 1437436800  

July 2015
Presenter: G. Wade Johnson
Lists are a fundamental data type in Perl, unfortunately people do not make as good a use of them as they could. In this presentation, Wade gives an overview of lists and arrays and the operations that apply to each. He then went over the modules List::Util and List::MoreUtils for more advanced list operations.

Hooking up your distribution to TravisCI and Coveralls.io πŸ”— 1432166400  

May 2015
Presenter: George S. Baugh
Many development groups use continuous integration to generate quick feedback on the quality of their software. George shows how to use the TravisCI and Coveralls.io systems to provide equivalent functionality for your Perl Modules.

Weaponizing Perl Serialization Flaws with Metasploit πŸ”— 1429574400  

April 2015
Presenter: John Lightsey
In recent years, there have been a few potential security flaws relating to serialization libraries for dynamic languages. This presentation introduces a few of these flaws and shows how they can be turned into actual attacks using Metasploit.

25 most recent posts older than 1429574400
Prev Size:
Jump to:
POTZREBIE
Creative Commons License
Copyright © 2003-2020 Houston.pm.
Except as otherwise noted, this site is licensed under a Creative Commons Attribution 2.5 License.
The use of the camel image in association with the Perl programming language is a trademark of O'Reilly & Associates, Inc. Used with permission.